repo_name
stringlengths 1
52
| repo_creator
stringclasses 6
values | programming_language
stringclasses 4
values | code
stringlengths 0
9.68M
| num_lines
int64 1
234k
|
---|---|---|---|---|
eks-anywhere-packages | aws | Go | package filewriter
import (
"errors"
"fmt"
"io"
"io/fs"
"io/ioutil"
"os"
"path/filepath"
)
type writer struct {
dir string
tempDir string
}
func NewWriter(dir string) (FileWriter, error) {
newFolder := filepath.Join(dir, DefaultTmpFolder)
if _, err := os.Stat(newFolder); errors.Is(err, os.ErrNotExist) {
err := os.MkdirAll(newFolder, os.ModePerm)
if err != nil {
return nil, fmt.Errorf("creating directory [%s]: %v", dir, err)
}
}
return &writer{dir: dir, tempDir: newFolder}, nil
}
func (w *writer) Write(fileName string, content []byte, opts ...FileOptionsFunc) (string, error) {
o := buildOptions(w, opts)
filePath := filepath.Join(o.BasePath, fileName)
err := ioutil.WriteFile(filePath, content, o.Permissions)
if err != nil {
return "", fmt.Errorf("writing to file [%s]: %v", filePath, err)
}
return filePath, nil
}
func (w *writer) WithDir(dir string) (FileWriter, error) {
return NewWriter(filepath.Join(w.dir, dir))
}
func (w *writer) Dir() string {
return w.dir
}
func (w *writer) TempDir() string {
return w.tempDir
}
func (w *writer) CleanUp() {
_, err := os.Stat(w.dir)
if err == nil {
os.RemoveAll(w.dir)
}
}
func (w *writer) CleanUpTemp() {
_, err := os.Stat(w.tempDir)
if err == nil {
os.RemoveAll(w.tempDir)
}
}
// Create creates a file with the given name rooted at w's base directory.
func (w *writer) Create(name string, opts ...FileOptionsFunc) (_ io.WriteCloser, path string, _ error) {
o := buildOptions(w, opts)
path = filepath.Join(o.BasePath, name)
fh, err := os.OpenFile(path, os.O_CREATE|os.O_RDWR, o.Permissions)
return fh, path, err
}
type options struct {
BasePath string
Permissions fs.FileMode
}
// buildOptions converts a set of FileOptionsFunc's to a single options struct.
func buildOptions(w *writer, opts []FileOptionsFunc) options {
op := defaultFileOptions()
for _, fn := range opts {
fn(op)
}
var basePath string
if op.IsTemp {
basePath = w.tempDir
} else {
basePath = w.dir
}
return options{
BasePath: basePath,
Permissions: op.Permissions,
}
}
| 100 |
eks-anywhere-packages | aws | Go | package filewriter_test
import (
"fmt"
"os"
"path/filepath"
"strings"
"testing"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/internal/test"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/pkg/filewriter"
)
func TestWriterWriteValid(t *testing.T) {
folder := "tmp_folder"
folder2 := "tmp_folder_2"
err := os.MkdirAll(folder2, os.ModePerm)
if err != nil {
t.Fatalf("error setting up test: %v", err)
}
defer os.RemoveAll(folder)
defer os.RemoveAll(folder2)
tests := []struct {
testName string
dir string
fileName string
content []byte
}{
{
testName: "test 1",
dir: folder,
fileName: "TestWriterWriteValid-success.yaml",
content: []byte(`
fake content
blablab
`),
},
{
testName: "test 2",
dir: folder2,
fileName: "TestWriterWriteValid-success.yaml",
content: []byte(`
fake content
blablab
`),
},
}
for _, tt := range tests {
t.Run(tt.testName, func(t *testing.T) {
tr, err := filewriter.NewWriter(tt.dir)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
gotPath, err := tr.Write(tt.fileName, tt.content)
if err != nil {
t.Fatalf("writer.Write() error = %v", err)
}
wantPath := filepath.Join(tt.dir, filewriter.DefaultTmpFolder, tt.fileName)
if strings.Compare(gotPath, wantPath) != 0 {
t.Errorf("writer.Write() = %v, want %v", gotPath, wantPath)
}
test.AssertFilesEquals(t, gotPath, wantPath)
})
}
}
func TestEmptyFileName(t *testing.T) {
folder := "tmp_folder"
defer os.RemoveAll(folder)
tr, err := filewriter.NewWriter(folder)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
_, err = tr.Write("", []byte("content"))
if err == nil {
t.Fatalf("writer.Write() error is nil")
}
}
func TestWriterWithDir(t *testing.T) {
rootFolder := "folder_root"
subFolder := "subFolder"
defer os.RemoveAll(rootFolder)
tr, err := filewriter.NewWriter(rootFolder)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
tr, err = tr.WithDir(subFolder)
if err != nil {
t.Fatalf("failed creating writer with subdir error = %v", err)
}
gotPath, err := tr.Write("file.txt", []byte("file content"))
if err != nil {
t.Fatalf("writer.Write() error = %v", err)
}
wantPathPrefix := filepath.Join(rootFolder, subFolder)
if !strings.HasPrefix(gotPath, wantPathPrefix) {
t.Errorf("writer.Write() = %v, want to start with %v", gotPath, wantPathPrefix)
}
}
func TestWriterWritePersistent(t *testing.T) {
folder := "tmp_folder_opt"
folder2 := "tmp_folder_2_opt"
err := os.MkdirAll(folder2, os.ModePerm)
if err != nil {
t.Fatalf("error setting up test: %v", err)
}
defer os.RemoveAll(folder)
defer os.RemoveAll(folder2)
tests := []struct {
testName string
dir string
fileName string
content []byte
options []filewriter.FileOptionsFunc
}{
{
testName: "Write persistent file",
dir: folder,
fileName: "TestWriterWriteValid-success.yaml",
content: []byte(`
fake content
blablab
`),
options: []filewriter.FileOptionsFunc{filewriter.PersistentFile},
},
}
for _, tt := range tests {
t.Run(tt.testName, func(t *testing.T) {
tr, err := filewriter.NewWriter(tt.dir)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
gotPath, err := tr.Write(tt.fileName, tt.content, tt.options...)
if err != nil {
t.Fatalf("writer.Write() error = %v", err)
}
wantPath := filepath.Join(tt.dir, tt.fileName)
if strings.Compare(gotPath, wantPath) != 0 {
t.Errorf("writer.Write() = %v, want %v", gotPath, wantPath)
}
test.AssertFilesEquals(t, gotPath, wantPath)
})
}
}
func TestWriterDir(t *testing.T) {
rootFolder := "folder_root"
defer os.RemoveAll(rootFolder)
tr, err := filewriter.NewWriter(rootFolder)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
if strings.Compare(tr.Dir(), rootFolder) != 0 {
t.Errorf("writer.Dir() = %v, want %v", tr.Dir(), rootFolder)
}
}
func TestWriterTempDir(t *testing.T) {
rootFolder := "folder_root"
tempFolder := fmt.Sprintf("%s/generated", rootFolder)
defer os.RemoveAll(rootFolder)
tr, err := filewriter.NewWriter(rootFolder)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
if strings.Compare(tr.TempDir(), tempFolder) != 0 {
t.Errorf("writer.TempDir() = %v, want %v", tr.TempDir(), tempFolder)
}
}
func TestWriterCleanUpTempDir(t *testing.T) {
rootFolder := "folder_root"
defer os.RemoveAll(rootFolder)
tr, err := filewriter.NewWriter(rootFolder)
if err != nil {
t.Fatalf("failed creating writer error = %v", err)
}
tr.CleanUpTemp()
if _, err := os.Stat(tr.TempDir()); err == nil {
t.Errorf("writer.CleanUp(), want err, got nil")
}
}
| 204 |
eks-anywhere-packages | aws | Go | package log
import (
"log"
"os"
)
var (
InfoLogger *log.Logger
WarningLogger *log.Logger
ErrorLogger *log.Logger
)
func init() {
InfoLogger = log.New(os.Stdout, "INFO: ", log.Lshortfile)
WarningLogger = log.New(os.Stderr, "WARNING: ", log.Lshortfile)
ErrorLogger = log.New(os.Stderr, "ERROR: ", log.Lshortfile)
}
| 19 |
eks-anywhere-packages | aws | Go | package templater
import (
"reflect"
"sigs.k8s.io/yaml"
)
type PartialYaml map[string]interface{}
func (p PartialYaml) AddIfNotZero(k string, v interface{}) {
if !isZeroVal(v) {
p[k] = v
}
}
func isZeroVal(x interface{}) bool {
return x == nil || reflect.DeepEqual(x, reflect.Zero(reflect.TypeOf(x)).Interface())
}
func (p PartialYaml) ToYaml() (string, error) {
b, err := yaml.Marshal(p)
if err != nil {
return "", err
}
s := string(b)
return s, nil
}
| 30 |
eks-anywhere-packages | aws | Go | package templater_test
import (
"reflect"
"testing"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/internal/test"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/pkg/templater"
)
func TestPartialYamlAddIfNotZero(t *testing.T) {
tests := []struct {
testName string
p templater.PartialYaml
k string
v interface{}
wantAdded bool
wantV interface{}
}{
{
testName: "add string",
p: templater.PartialYaml{},
k: "key",
v: "value",
wantAdded: true,
wantV: "value",
},
{
testName: "add nil",
p: templater.PartialYaml{},
k: "key",
v: nil,
wantAdded: false,
wantV: nil,
},
{
testName: "add empty string",
p: templater.PartialYaml{},
k: "key",
v: "",
wantAdded: false,
wantV: nil,
},
{
testName: "add present string",
p: templater.PartialYaml{
"key": "value_old",
},
k: "key",
v: "value_new",
wantAdded: true,
wantV: "value_new",
},
}
for _, tt := range tests {
t.Run(tt.testName, func(t *testing.T) {
tt.p.AddIfNotZero(tt.k, tt.v)
gotV, gotAdded := tt.p[tt.k]
if tt.wantAdded != gotAdded {
t.Errorf("PartialYaml.AddIfNotZero() wasAdded = %v, wantAdded %v", gotAdded, tt.wantAdded)
}
if !reflect.DeepEqual(gotV, tt.wantV) {
t.Errorf("PartialYaml.AddIfNotZero() gotValue = %v, wantValue %v", gotV, tt.wantV)
}
})
}
}
func TestPartialYamlToYaml(t *testing.T) {
tests := []struct {
testName string
p templater.PartialYaml
wantFile string
wantErr bool
}{
{
testName: "simple object",
p: templater.PartialYaml{
"key1": "value 1",
"key2": 2,
"key3": "value3",
},
wantFile: "testdata/partial_yaml_object_expected.yaml",
wantErr: false,
},
{
testName: "map",
p: templater.PartialYaml{
"key1": "value 1",
"key2": 2,
"key3": map[string]string{
"key_nest1": "value nest",
"key_nest2": "value nest 2",
},
"key4": map[string]interface{}{
"key_nest1": "value nest",
"key_nest2": 22,
},
},
wantFile: "testdata/partial_yaml_map_expected.yaml",
wantErr: false,
},
{
testName: "array",
p: templater.PartialYaml{
"key1": "value 1",
"key2": 2,
"key3": []string{"value array 1", "value array 2"},
"key4": []interface{}{
map[string]interface{}{
"key_in_nest_array": "value",
"key_in_nest_array_2": 22,
},
},
},
wantFile: "testdata/partial_yaml_array_expected.yaml",
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.testName, func(t *testing.T) {
got, err := tt.p.ToYaml()
if (err != nil) != tt.wantErr {
t.Fatalf("PartialYaml.ToYaml() error = %v, wantErr %v", err, tt.wantErr)
}
test.AssertContentToFile(t, got, tt.wantFile)
})
}
}
| 132 |
eks-anywhere-packages | aws | Go | package templater
import (
"bytes"
"fmt"
"strings"
"text/template"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/pkg/filewriter"
)
type Templater struct {
writer filewriter.FileWriter
}
func New(writer filewriter.FileWriter) *Templater {
return &Templater{
writer: writer,
}
}
func (t *Templater) WriteToFile(templateContent string, data interface{}, fileName string, f ...filewriter.FileOptionsFunc) (filePath string, err error) {
bytes, err := Execute(templateContent, data)
if err != nil {
return "", err
}
writtenFilePath, err := t.writer.Write(fileName, bytes, f...)
if err != nil {
return "", fmt.Errorf("writing template file: %v", err)
}
return writtenFilePath, nil
}
func (t *Templater) WriteBytesToFile(content []byte, fileName string, f ...filewriter.FileOptionsFunc) (filePath string, err error) {
writtenFilePath, err := t.writer.Write(fileName, content, f...)
if err != nil {
return "", fmt.Errorf("writing template file: %v", err)
}
return writtenFilePath, nil
}
func Execute(templateContent string, data interface{}) ([]byte, error) {
temp := template.New("tmpl")
funcMap := map[string]interface{}{
"indent": func(spaces int, v string) string {
pad := strings.Repeat(" ", spaces)
return pad + strings.Replace(v, "\n", "\n"+pad, -1)
},
"stringsJoin": strings.Join,
}
temp = temp.Funcs(funcMap)
temp, err := temp.Parse(templateContent)
if err != nil {
return nil, fmt.Errorf("parsing template: %v", err)
}
var buf bytes.Buffer
err = temp.Execute(&buf, data)
if err != nil {
return nil, fmt.Errorf("substituting values for template: %v", err)
}
return buf.Bytes(), nil
}
| 67 |
eks-anywhere-packages | aws | Go | package templater_test
import (
"os"
"strings"
"testing"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/internal/test"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/pkg/filewriter"
"github.com/aws/eks-anywhere-packages/credentialproviderpackage/pkg/templater"
)
func TestTemplaterWriteToFileSuccess(t *testing.T) {
type dataStruct struct {
Key1, Key2, Key3, KeyAndValue3 string
Conditional bool
}
tests := []struct {
testName string
templateFile string
data dataStruct
fileName string
wantFilePath string
wantErr bool
}{
{
testName: "with conditional true",
templateFile: "testdata/test1_template.yaml",
data: dataStruct{
Key1: "value_1",
Key2: "value_2",
Key3: "value_3",
Conditional: true,
},
fileName: "file_tmp.yaml",
wantFilePath: "testdata/test1_conditional_true_want.yaml",
wantErr: false,
},
{
testName: "with conditional false",
templateFile: "testdata/test1_template.yaml",
data: dataStruct{
Key1: "value_1",
Key2: "value_2",
Key3: "value_3",
Conditional: false,
},
fileName: "file_tmp.yaml",
wantFilePath: "testdata/test1_conditional_false_want.yaml",
wantErr: false,
},
{
testName: "with indent",
templateFile: "testdata/test_indent_template.yaml",
data: dataStruct{
Key1: "value_1",
Key2: "value_2",
KeyAndValue3: "key3: value_3",
Conditional: true,
},
fileName: "file_tmp.yaml",
wantFilePath: "testdata/test_indent_want.yaml",
wantErr: false,
},
}
for _, tt := range tests {
t.Run(tt.testName, func(t *testing.T) {
_, writer := test.NewWriter(t)
tr := templater.New(writer)
templateContent := test.ReadFile(t, tt.templateFile)
gotFilePath, err := tr.WriteToFile(templateContent, tt.data, tt.fileName)
if (err != nil) != tt.wantErr {
t.Fatalf("Templater.WriteToFile() error = %v, wantErr %v", err, tt.wantErr)
}
if !strings.HasSuffix(gotFilePath, tt.fileName) {
t.Errorf("Templater.WriteToFile() = %v, want to end with %v", gotFilePath, tt.fileName)
}
test.AssertFilesEquals(t, gotFilePath, tt.wantFilePath)
})
}
}
func TestTemplaterWriteToFileError(t *testing.T) {
folder := "tmp_folder"
defer os.RemoveAll(folder)
writer, err := filewriter.NewWriter(folder)
if err != nil {
t.Fatalf("failed creating writer error = #{err}")
}
type dataStruct struct {
Key1, Key2, Key3 string
Conditional bool
}
tests := []struct {
testName string
templateFile string
data dataStruct
fileName string
}{
{
testName: "invalid template",
templateFile: "testdata/invalid_template.yaml",
data: dataStruct{
Key1: "value_1",
Key2: "value_2",
Key3: "value_3",
Conditional: true,
},
fileName: "file_tmp.yaml",
},
{
testName: "data doesn't exist",
templateFile: "testdata/key4_template.yaml",
data: dataStruct{
Key1: "value_1",
Key2: "value_2",
Key3: "value_3",
Conditional: false,
},
fileName: "file_tmp.yaml",
},
}
for _, tt := range tests {
t.Run(tt.testName, func(t *testing.T) {
tr := templater.New(writer)
templateContent := test.ReadFile(t, tt.templateFile)
gotFilePath, err := tr.WriteToFile(templateContent, tt.data, tt.fileName)
if err == nil {
t.Errorf("Templater.WriteToFile() error = nil")
}
if gotFilePath != "" {
t.Errorf("Templater.WriteToFile() = %v, want nil", gotFilePath)
}
})
}
}
| 144 |
eks-anywhere-packages | aws | Go | package templater
import (
"fmt"
"k8s.io/apimachinery/pkg/runtime"
"sigs.k8s.io/yaml"
)
const objectSeparator string = "\n---\n"
func AppendYamlResources(resources ...[]byte) []byte {
separator := []byte(objectSeparator)
size := 0
for _, resource := range resources {
size += len(resource) + len(separator)
}
b := make([]byte, 0, size)
for _, resource := range resources {
b = append(b, resource...)
b = append(b, separator...)
}
return b
}
func ObjectsToYaml(objs ...runtime.Object) ([]byte, error) {
r := [][]byte{}
for _, o := range objs {
b, err := yaml.Marshal(o)
if err != nil {
return nil, fmt.Errorf("failed to marshal object: %v", err)
}
r = append(r, b)
}
return AppendYamlResources(r...), nil
}
| 40 |
eks-anywhere-packages | aws | Go | package main
import (
"fmt"
"os"
"time"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/constants"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets/aws"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets/common"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets/registrymirror"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/utils"
)
func main() {
utils.InfoLogger.Println("Running at " + time.Now().UTC().String())
defaultClientSet, err := common.GetDefaultClientSet()
if err != nil {
utils.ErrorLogger.Println(err)
os.Exit(0)
}
clientSets, err := common.GetRemoteClientSets(defaultClientSet)
if err != nil {
utils.ErrorLogger.Println(err)
os.Exit(0)
}
defaultClusterName, found := os.LookupEnv(constants.DefaultClusterNameKey)
if !found {
utils.ErrorLogger.Println(fmt.Errorf("environment variable %s is required", constants.DefaultClusterNameKey))
os.Exit(0)
}
clientSets[defaultClusterName] = defaultClientSet
secrets := []secrets.Secret{
&aws.AwsSecret{},
®istrymirror.RegistryMirrorSecret{},
}
utils.InfoLogger.Println("Initialization starts...")
for _, secret := range secrets {
err := secret.Init(defaultClusterName, clientSets)
if err != nil {
utils.ErrorLogger.Println(err)
}
}
utils.InfoLogger.Println("Initialization completes...")
utils.InfoLogger.Println("Broadcasting starts...")
for _, secret := range secrets {
if secret.IsActive() {
err = secret.BroadcastCredentials()
if err != nil {
utils.ErrorLogger.Println(err)
}
} else {
utils.InfoLogger.Println(secret.GetName() + " is inactive")
}
}
utils.InfoLogger.Println("Broadcasting ends...")
utils.InfoLogger.Println("Job complete at " + time.Now().UTC().String())
}
| 66 |
eks-anywhere-packages | aws | Go | package constants
const (
ConfigMapName = "ns-secret-map"
EksaSystemNamespace = "eksa-system"
PackagesNamespace = "eksa-packages"
NamespacePrefix = PackagesNamespace + "-"
DefaultClusterNameKey = "CLUSTER_NAME"
)
| 10 |
eks-anywhere-packages | aws | Go | package k8s
import (
"context"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/constants"
)
func GetSecret(clientSet kubernetes.Interface, name, namespace string) (*corev1.Secret, error) {
secret, err := clientSet.CoreV1().Secrets(namespace).Get(context.TODO(), name, metav1.GetOptions{})
if err != nil {
return nil, err
}
return secret, nil
}
func CreateSecret(clientSet kubernetes.Interface, name string, namespace string, data map[string][]byte) (*corev1.Secret, error) {
object := metav1.ObjectMeta{
Name: name,
Namespace: namespace,
}
secret := corev1.Secret{
ObjectMeta: object,
Type: corev1.SecretTypeDockerConfigJson,
Data: data,
}
return clientSet.CoreV1().Secrets(namespace).Create(context.TODO(), &secret, metav1.CreateOptions{})
}
func UpdateSecret(clientSet kubernetes.Interface, namespace string, secret *corev1.Secret, data map[string][]byte) (*corev1.Secret, error) {
for k, v := range data {
secret.Data[k] = v
}
return clientSet.CoreV1().Secrets(namespace).Update(context.TODO(), secret, metav1.UpdateOptions{})
}
func GetNamespaces(clientSet kubernetes.Interface) (*corev1.NamespaceList, error) {
nslist, err := clientSet.CoreV1().Namespaces().List(context.TODO(), metav1.ListOptions{})
if err != nil {
return nil, err
}
return nslist, nil
}
func GetConfigMap(clientSet kubernetes.Interface, namespace string) (*corev1.ConfigMap, error) {
cm, err := clientSet.CoreV1().ConfigMaps(namespace).
Get(context.TODO(), constants.ConfigMapName, metav1.GetOptions{})
if err != nil {
return nil, err
}
return cm, err
}
| 58 |
eks-anywhere-packages | aws | Go | package secrets
import "k8s.io/client-go/kubernetes"
type Credential struct {
Registry string
Username string
Password string
CA string
Insecure string
}
type (
ClusterClientSet map[string]kubernetes.Interface
ClusterCredential map[string][]*Credential
)
type Secret interface {
Init(mgmtClusterName string, clientSets ClusterClientSet) error
IsActive() bool
GetClusterCredentials(clientSets ClusterClientSet) (ClusterCredential, error)
BroadcastCredentials() error
GetName() string
}
| 25 |
eks-anywhere-packages | aws | Go | package aws
import (
"encoding/base64"
"encoding/json"
"fmt"
"os"
"path/filepath"
"strings"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/session"
"github.com/aws/aws-sdk-go/service/ecr"
"github.com/aws/aws-sdk-go/service/sts"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets/common"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/utils"
)
type AwsSecret struct {
secretName string
mgmtClusterName string
clientSets secrets.ClusterClientSet
clusterCredentials secrets.ClusterCredential
}
var _ secrets.Secret = (*AwsSecret)(nil)
const (
envVarAwsSecret = "ECR_TOKEN_SECRET_NAME" //#nosec G101
envVarIRSAToken = "AWS_WEB_IDENTITY_TOKEN_FILE" //#nosec G101
envRoleARN = "AWS_ROLE_ARN"
envWebTokenFile = "AWS_WEB_IDENTITY_TOKEN_FILE" //#nosec G101
sessionName = "GetECRTOKENSession"
sessionTimeSeconds = 1000
defaultAccountID = "783794618700"
devAccountID = "857151390494"
envRegionName = "AWS_REGION"
envVarAwsAccessKeyID = "AWS_ACCESS_KEY_ID"
envVarAwsAccessKey = "AWS_SECRET_ACCESS_KEY"
envSessionToken = "AWS_SESSION_TOKEN"
regionDefault = "us-west-2"
)
func (aws *AwsSecret) Init(mgmtClusterName string, clientSets secrets.ClusterClientSet) error {
secretname := os.Getenv(envVarAwsSecret)
if secretname == "" {
return fmt.Errorf("environment variable %s is required", envVarAwsSecret)
}
aws.secretName = secretname
// Check if IRSA is setup
// If IRSA is enabled, use IRSA to setup enviroment variables for AWS Creds
webIdentityTokenFile := os.Getenv(envVarIRSAToken)
if webIdentityTokenFile != "" {
err := setupIRSA()
if err != nil {
return err
}
}
aws.mgmtClusterName = mgmtClusterName
aws.clientSets = clientSets
return nil
}
func (aws *AwsSecret) IsActive() bool {
if val, _ := os.LookupEnv(envVarAwsAccessKeyID); val == "" {
return false
}
if val, _ := os.LookupEnv(envVarAwsAccessKey); val == "" {
return false
}
return true
}
func (aws *AwsSecret) GetName() string {
return aws.secretName
}
func (aws *AwsSecret) GetClusterCredentials(clientSets secrets.ClusterClientSet) (secrets.ClusterCredential, error) {
creds, err := aws.getCredentials()
if err != nil {
return nil, err
}
clusterCredentials := make(secrets.ClusterCredential)
for clusterName := range clientSets {
clusterCredentials[clusterName] = creds
}
return clusterCredentials, nil
}
func (aws *AwsSecret) getCredentials() ([]*secrets.Credential, error) {
utils.InfoLogger.Println("fetching auth data from AWS... ")
// Default AWS Region to us-west-2 if not set by User.
_, ok := os.LookupEnv(envRegionName)
if !ok {
err := os.Setenv(envRegionName, regionDefault)
if err != nil {
return nil, err
}
}
var ecrRegs []*string
defID := defaultAccountID
ecrRegs = append(ecrRegs, &defID)
devID := devAccountID
ecrRegs = append(ecrRegs, &devID)
svc := ecr.New(session.Must(session.NewSession()))
token, err := svc.GetAuthorizationToken(&ecr.GetAuthorizationTokenInput{RegistryIds: ecrRegs})
if err != nil {
return nil, err
}
if token == nil {
return nil, fmt.Errorf("response output from ECR was nil")
}
if len(token.AuthorizationData) == 0 {
return nil, fmt.Errorf("authorization data was empty")
}
var creds []*secrets.Credential
for _, auth := range token.AuthorizationData {
decode, err := base64.StdEncoding.DecodeString(*auth.AuthorizationToken)
if err != nil {
return nil, err
}
parts := strings.Split(string(decode), ":")
if len(parts) != 2 {
return nil, fmt.Errorf("error parsing username and password from authorization token")
}
cred := secrets.Credential{
Username: parts[0],
Password: parts[1],
Registry: *auth.ProxyEndpoint,
}
creds = append(creds, &cred)
}
utils.InfoLogger.Println("success.")
return creds, nil
}
func (aws *AwsSecret) BroadcastCredentials() error {
var err error
aws.clusterCredentials, err = aws.GetClusterCredentials(aws.clientSets)
if err != nil {
return err
}
for clusterName, creds := range aws.clusterCredentials {
dockerConfig := common.CreateDockerAuthConfig(creds)
configJson, err := json.Marshal(dockerConfig)
if err != nil {
return err
}
common.BroadcastDockerAuthConfig(configJson, aws.clientSets[aws.mgmtClusterName], aws.clientSets[clusterName], aws.secretName, clusterName)
}
return nil
}
func setupIRSA() error {
roleArn := os.Getenv(envRoleARN)
if roleArn == "" {
return fmt.Errorf("environment variable %s missing, check that Webhook for IRSA is setup", envRoleARN)
}
webIdentityTokenFile := os.Getenv(envWebTokenFile)
if webIdentityTokenFile == "" {
return fmt.Errorf("environment variable %s missing, check that token is mounted", envWebTokenFile)
}
token, err := os.ReadFile(filepath.Clean(webIdentityTokenFile))
if err != nil {
return err
}
webIdentityToken := string(token)
session, err := session.NewSession()
if err != nil {
return err
}
svc := sts.New(session)
input := &sts.AssumeRoleWithWebIdentityInput{
DurationSeconds: aws.Int64(sessionTimeSeconds),
RoleArn: aws.String(roleArn),
RoleSessionName: aws.String(sessionName),
WebIdentityToken: aws.String(webIdentityToken),
}
result, err := svc.AssumeRoleWithWebIdentity(input)
if err != nil {
return err
}
err = os.Setenv(envVarAwsAccessKeyID, aws.StringValue(result.Credentials.AccessKeyId))
if err != nil {
return err
}
err = os.Setenv(envVarAwsAccessKey, aws.StringValue(result.Credentials.SecretAccessKey))
if err != nil {
return err
}
err = os.Setenv(envSessionToken, aws.StringValue(result.Credentials.SessionToken))
if err != nil {
return err
}
return err
}
| 212 |
eks-anywhere-packages | aws | Go | package common
import (
"encoding/base64"
"fmt"
"os"
"path/filepath"
"strings"
corev1 "k8s.io/api/core/v1"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
"k8s.io/client-go/tools/clientcmd"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/constants"
k8s "github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/kubernetes"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/utils"
)
const defaultEmail = "[email protected]"
type dockerConfig struct {
Auths map[string]*dockerAuth `json:"auths"`
}
type dockerAuth struct {
Username string `json:"username"`
Password string `json:"password"`
Email string `json:"email"`
Auth string `json:"auth"`
}
func GetDefaultClientSet() (*kubernetes.Clientset, error) {
config, err := rest.InClusterConfig()
if err != nil {
// Program is not being run from inside cluster. Try default kubeconfig
if val, ok := os.LookupEnv("KUBECONFIG"); ok {
config, err = clientcmd.BuildConfigFromFlags("", val)
} else {
config, err = clientcmd.BuildConfigFromFlags("",
filepath.Join(os.Getenv("HOME"), ".kube", "config"))
}
if err != nil {
return nil, err
}
}
clientSet, err := kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
return clientSet, err
}
func GetRemoteClientSets(defaultClientset *kubernetes.Clientset) (secrets.ClusterClientSet, error) {
clusterNames, err := getClusterNameFromNamespaces(defaultClientset)
if err != nil {
return nil, err
}
remoteClientSets := make(secrets.ClusterClientSet)
for _, clusterName := range clusterNames {
secretName := clusterName + "-kubeconfig"
kubeconfigSecret, err := k8s.GetSecret(defaultClientset, secretName, constants.EksaSystemNamespace)
if err != nil {
return nil, err
}
kubeconfig := kubeconfigSecret.Data["value"]
if len(kubeconfig) <= 0 {
return nil, fmt.Errorf("kubeconfig string in secret not set")
}
clientConfig, err := clientcmd.NewClientConfigFromBytes(kubeconfig)
if err != nil {
return nil, fmt.Errorf("creating client config: %s", err)
}
config, err := clientConfig.ClientConfig()
if err != nil {
return nil, fmt.Errorf("creating rest config config: %s", err)
}
remoteClientSet, err := kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
remoteClientSets[clusterName] = remoteClientSet
}
return remoteClientSets, nil
}
func getClusterNameFromNamespaces(clientSet kubernetes.Interface) ([]string, error) {
clusterNameList := make([]string, 0)
nslist, err := k8s.GetNamespaces(clientSet)
if err != nil {
return nil, err
}
for _, ns := range nslist.Items {
if strings.HasPrefix(ns.Name, constants.NamespacePrefix) {
clusterName := strings.TrimPrefix(ns.Name, constants.NamespacePrefix)
clusterNameList = append(clusterNameList, clusterName)
}
}
return clusterNameList, nil
}
func CreateDockerAuthConfig(creds []*secrets.Credential) *dockerConfig {
config := dockerConfig{Auths: make(map[string]*dockerAuth)}
for _, cred := range creds {
config.Auths[cred.Registry] = &dockerAuth{
Username: cred.Username,
Password: cred.Password,
Email: defaultEmail,
Auth: base64.StdEncoding.EncodeToString([]byte(cred.Username + ":" + cred.Password)),
}
}
return &config
}
func BroadcastDockerAuthConfig(configJson []byte, defaultClientSet, remoteClientSet kubernetes.Interface, secretName, clusterName string) {
namespaces, err := getNamespacesFromConfigMap(defaultClientSet, constants.NamespacePrefix+clusterName)
if err != nil {
utils.WarningLogger.Printf("failed to find config map for cluster %s\n", clusterName)
return
}
for _, ns := range namespaces {
secret, _ := k8s.GetSecret(remoteClientSet, secretName, ns)
if secret == nil {
_, err = k8s.CreateSecret(remoteClientSet, secretName, ns, map[string][]byte{corev1.DockerConfigJsonKey: configJson})
if err != nil {
utils.WarningLogger.Printf("failed to create %s in %s namespace\n", secretName, ns)
}
} else {
_, err = k8s.UpdateSecret(remoteClientSet, ns, secret, map[string][]byte{corev1.DockerConfigJsonKey: configJson})
if err != nil {
utils.WarningLogger.Printf("failed to update %s in %s namespace\n", secretName, ns)
}
}
}
}
func getNamespacesFromConfigMap(clientSet kubernetes.Interface, namespace string) ([]string, error) {
cm, err := k8s.GetConfigMap(clientSet, namespace)
if err != nil {
return nil, err
}
values := make([]string, 0)
for ns := range cm.Data {
values = append(values, ns)
}
return values, err
}
| 162 |
eks-anywhere-packages | aws | Go | package common
import (
"encoding/base64"
"encoding/json"
"testing"
"github.com/stretchr/testify/assert"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes/fake"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/constants"
k8s "github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/kubernetes"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets"
)
const (
secretName = "test-secret"
clusterName = "test-cluster"
)
var (
ns = &v1.Namespace{
ObjectMeta: metav1.ObjectMeta{
Name: constants.NamespacePrefix + clusterName,
},
}
cm = &v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: constants.ConfigMapName,
Namespace: constants.NamespacePrefix + clusterName,
},
Data: map[string]string{
"ns1": secretName,
"ns2": secretName,
},
}
secret = &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: secretName,
Namespace: "ns1",
},
Data: map[string][]byte{
v1.DockerConfigJsonKey: {},
},
}
)
func TestCreateDockerAuthConfig(t *testing.T) {
creds := []*secrets.Credential{
{
Username: "user",
Password: "password",
Registry: "1.2.3.4",
},
}
dockerConfig := CreateDockerAuthConfig(creds)
assert.NotNil(t, dockerConfig)
assert.Equal(t, len(dockerConfig.Auths), 1)
assert.EqualValues(t, &dockerAuth{
Username: "user",
Password: "password",
Email: defaultEmail,
Auth: base64.StdEncoding.EncodeToString([]byte("user:password")),
}, dockerConfig.Auths["1.2.3.4"])
}
func TestBroadcastDockerAuthConfig(t *testing.T) {
dockerConfig := dockerConfig{
Auths: map[string]*dockerAuth{
"1.2.3.4": {
Username: "user",
Password: "password",
Email: "[email protected]",
Auth: "dXNlcjpwYXNzd29yZA==",
},
},
}
configJson, _ := json.Marshal(dockerConfig)
defaultClientSet := fake.NewSimpleClientset(cm)
t.Run("create secret", func(t *testing.T) {
remoteClientSets := secrets.ClusterClientSet{
clusterName: fake.NewSimpleClientset(),
}
BroadcastDockerAuthConfig(configJson, defaultClientSet, remoteClientSets[clusterName], secretName, clusterName)
for _, ns := range []string{"ns1", "ns2"} {
secret, err := k8s.GetSecret(remoteClientSets[clusterName], secretName, ns)
assert.NoError(t, err)
assert.Equal(t, configJson, secret.Data[v1.DockerConfigJsonKey])
}
})
t.Run("update secret", func(t *testing.T) {
remoteClientSets := secrets.ClusterClientSet{
clusterName: fake.NewSimpleClientset(secret),
}
BroadcastDockerAuthConfig(configJson, defaultClientSet, remoteClientSets[clusterName], secretName, clusterName)
secret, err := k8s.GetSecret(remoteClientSets[clusterName], secretName, "ns1")
assert.NoError(t, err)
assert.Equal(t, configJson, secret.Data[v1.DockerConfigJsonKey])
})
}
func TestGetClusterNameFromNamespaces(t *testing.T) {
clientSet := fake.NewSimpleClientset(ns)
nsList, err := getClusterNameFromNamespaces(clientSet)
assert.NoError(t, err)
assert.ElementsMatch(t, nsList, []string{clusterName})
}
func TestGetNamespacesFromConfigMap(t *testing.T) {
clientSet := fake.NewSimpleClientset(cm)
nsList, err := getNamespacesFromConfigMap(clientSet, constants.NamespacePrefix+clusterName)
assert.NoError(t, err)
assert.ElementsMatch(t, nsList, []string{"ns1", "ns2"})
}
| 120 |
eks-anywhere-packages | aws | Go | package registrymirror
import (
"encoding/json"
corev1 "k8s.io/api/core/v1"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/constants"
k8s "github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/kubernetes"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/secrets/common"
"github.com/aws/eks-anywhere-packages/ecrtokenrefresher/pkg/utils"
)
const (
endpointKey = "ENDPOINT"
usernameKey = "USERNAME"
passwordKey = "PASSWORD"
caKey = "CACERTCONTENT"
insecureKey = "INSECURE"
credName = "registry-mirror-cred"
secretName = "registry-mirror-secret"
)
type RegistryMirrorSecret struct {
credName string
mgmtClusterName string
clientSets secrets.ClusterClientSet
clusterCredentials secrets.ClusterCredential
}
var _ secrets.Secret = (*RegistryMirrorSecret)(nil)
func (mirror *RegistryMirrorSecret) Init(mgmtClusterName string, clientSets secrets.ClusterClientSet) error {
var err error
mirror.credName = credName
mirror.mgmtClusterName = mgmtClusterName
mirror.clientSets = clientSets
mirror.clusterCredentials, err = mirror.GetClusterCredentials(mirror.clientSets)
return err
}
func (mirror *RegistryMirrorSecret) IsActive() bool {
return len(mirror.clusterCredentials) > 0
}
func (mirror *RegistryMirrorSecret) GetName() string {
return mirror.credName
}
func (mirror *RegistryMirrorSecret) GetClusterCredentials(clientSets secrets.ClusterClientSet) (secrets.ClusterCredential, error) {
clusterCredentials := make(secrets.ClusterCredential)
defaultClientSet := mirror.clientSets[mirror.mgmtClusterName]
for clusterName := range clientSets {
utils.InfoLogger.Printf("fetching registry mirror auth data for cluster %s...\n", clusterName)
namespace := constants.PackagesNamespace
if clusterName != mirror.mgmtClusterName {
namespace = constants.NamespacePrefix + clusterName
}
secret, err := k8s.GetSecret(defaultClientSet, secretName, namespace)
if err == nil {
credential := &secrets.Credential{
Registry: string(secret.Data[endpointKey]),
Username: string(secret.Data[usernameKey]),
Password: string(secret.Data[passwordKey]),
CA: string(secret.Data[caKey]),
Insecure: string(secret.Data[insecureKey]),
}
if credential.Registry != "" && credential.Username != "" && credential.Password != "" {
clusterCredentials[clusterName] = []*secrets.Credential{credential}
utils.InfoLogger.Println("success.")
} else {
utils.InfoLogger.Println("empty credential.")
}
} else {
utils.ErrorLogger.Println(err)
return nil, err
}
}
return clusterCredentials, nil
}
func (mirror *RegistryMirrorSecret) BroadcastCredentials() error {
defaultClientSet := mirror.clientSets[mirror.mgmtClusterName]
data := make(map[string][]byte)
for clusterName, creds := range mirror.clusterCredentials {
dockerConfig := common.CreateDockerAuthConfig(creds)
configJson, err := json.Marshal(*dockerConfig)
if err != nil {
return err
}
common.BroadcastDockerAuthConfig(configJson, defaultClientSet, mirror.clientSets[clusterName], mirror.credName, clusterName)
if clusterName == mirror.mgmtClusterName {
data[corev1.DockerConfigJsonKey] = configJson
}
data[clusterName+"_ca.crt"] = []byte(creds[0].CA)
data["config.json"] = configJson
if creds[0].Insecure == "true" {
data[clusterName+"_insecure"] = []byte(creds[0].Insecure)
}
}
// create a registry mirror secret for package controller pod to mount
if _, ok := data[corev1.DockerConfigJsonKey]; !ok {
configJson, _ := json.Marshal(common.CreateDockerAuthConfig([]*secrets.Credential{{
Registry: "", Username: "", Password: "", CA: "", Insecure: "",
}}))
data[corev1.DockerConfigJsonKey] = configJson
}
secret, _ := k8s.GetSecret(defaultClientSet, credName, constants.PackagesNamespace)
if secret == nil {
_, err := k8s.CreateSecret(defaultClientSet, credName, constants.PackagesNamespace, data)
if err != nil {
return err
}
} else {
_, err := k8s.UpdateSecret(defaultClientSet, constants.PackagesNamespace, secret, data)
if err != nil {
return err
}
}
return nil
}
| 124 |
eks-anywhere-packages | aws | Go | package utils
import (
"log"
"os"
)
var (
InfoLogger *log.Logger
WarningLogger *log.Logger
ErrorLogger *log.Logger
)
func init() {
InfoLogger = log.New(os.Stdout, "INFO: ", log.Ldate|log.Ltime|log.Lshortfile)
WarningLogger = log.New(os.Stderr, "WARNING: ", log.Ldate|log.Ltime|log.Lshortfile)
ErrorLogger = log.New(os.Stderr, "ERROR: ", log.Ldate|log.Ltime|log.Lshortfile)
}
| 19 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"encoding/base64"
"encoding/json"
"fmt"
"os"
"path"
"strings"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/service/kms"
"github.com/aws/aws-sdk-go-v2/service/kms/types"
"gopkg.in/yaml.v2"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
sig "github.com/aws/eks-anywhere-packages/pkg/signature"
)
const (
// Excludes .spec.packages[].source.registry .spec.packages[].source.repository
Excludes = "LnNwZWMucGFja2FnZXNbXS5zb3VyY2UucmVnaXN0cnkKLnNwZWMucGFja2FnZXNbXS5zb3VyY2UucmVwb3NpdG9yeQo="
)
var (
FullSignatureAnnotation = path.Join(sig.EksaDomain.Name, sig.SignatureAnnotation)
FullExcludesAnnotation = path.Join(sig.EksaDomain.Name, sig.ExcludesAnnotation)
DefaultExcludesAnnotation = map[string]string{
FullExcludesAnnotation: Excludes,
}
)
var generatedMetadataFields = []string{"creationTimestamp", "generation", "managedFields", "uid", "resourceVersion"}
type BundleGenerateOpt func(config *BundleGenerate)
// NewBundleGenerate is used for generating YAML for generating a new sample CRD file.
func NewBundleGenerate(bundleName string, opts ...BundleGenerateOpt) *api.PackageBundle {
annotations := make(map[string]string)
annotations[FullExcludesAnnotation] = Excludes
return &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: bundleName,
Namespace: api.PackageNamespace,
Annotations: DefaultExcludesAnnotation,
},
Spec: api.PackageBundleSpec{
Packages: []api.BundlePackage{
{
Name: "sample-package",
Source: api.BundlePackageSource{
Repository: "sample-Repository",
Versions: []api.SourceVersion{
{
Name: "v0.0",
Digest: "sha256:da25f5fdff88c259bb2ce7c0f1e9edddaf102dc4fb9cf5159ad6b902b5194e66",
},
},
},
},
},
},
}
}
// NewPackageFromInput finds the SHA tags for any images in your BundlePackage
func (c *SDKClients) NewPackageFromInput(project Project) (*api.BundlePackage, error) {
var versionList []api.SourceVersion
var err error
// Check bundle Input registry for ECR Public Registry
if strings.Contains(project.Registry, "public.ecr.aws") {
versionList, err = c.GetShaForPublicInputs(project)
if err != nil {
return nil, err
}
}
// Check bundle Input registry for ECR Private Registry
if strings.Contains(project.Registry, "amazonaws.com") {
versionList, err = c.ecrClient.GetShaForInputs(project)
if err != nil {
return nil, err
}
}
if len(versionList) < 1 {
return nil, fmt.Errorf("unable to find SHA sum for given input tag %v", project.Versions)
}
bundlePkg := &api.BundlePackage{
Name: project.Name,
WorkloadOnly: project.WorkloadOnly,
Source: api.BundlePackageSource{
Repository: project.Repository,
Registry: project.Registry,
Versions: versionList,
},
}
return bundlePkg, nil
}
// AddMetadata adds the corresponding metadata to the crd files.
func AddMetadata(s api.PackageBundleSpec, name string) *api.PackageBundle {
return &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: api.PackageNamespace,
Annotations: DefaultExcludesAnnotation,
},
Spec: s,
}
}
// IfSignature checks if a signature exsits on a Packagebundle
func IfSignature(bundle *api.PackageBundle) (bool, error) {
annotations := bundle.Annotations
if annotations != nil {
return true, nil
}
return false, nil
}
// CheckSignature checks if current signature is equal to signature to added as an annotation, and skips if they are the same.
func CheckSignature(bundle *api.PackageBundle, signature string) (bool, error) {
if signature == "" || bundle == nil {
return false, fmt.Errorf("either signature or bundle is missing, but are required")
}
annotations := map[string]string{
FullSignatureAnnotation: signature,
}
// If current signature on file isn't at the --signature input return false, otherwsie true
if annotations[FullSignatureAnnotation] != bundle.Annotations[FullSignatureAnnotation] {
return false, fmt.Errorf("A signature already exists on the input file signatue")
}
return true, nil
}
// GetBundleSignature calls KMS and retrieves a signature, then base64 decodes it and returns that back
func GetBundleSignature(ctx context.Context, bundle *api.PackageBundle, key string) (string, error) {
digest, _, err := sig.GetDigest(bundle, sig.EksaDomain)
if err != nil {
return "", err
}
// Creating AWS Clients with profile
ConfigFilePath := "~/.aws/config"
val, ok := os.LookupEnv("AWS_CONFIG_FILE")
if ok {
ConfigFilePath = val
}
BundleLog.Info("Using Config File", "AWS_CONFIG_FILE", ConfigFilePath)
confWithProfile, err := config.LoadDefaultConfig(context.TODO(),
config.WithSharedConfigFiles(
[]string{ConfigFilePath},
),
config.WithRegion("us-west-2"),
config.WithSharedConfigProfile("default"),
)
if err != nil {
fmt.Println("configuration error, " + err.Error())
os.Exit(-1)
}
client := kms.NewFromConfig(confWithProfile)
input := &kms.SignInput{
KeyId: &key,
SigningAlgorithm: types.SigningAlgorithmSpecEcdsaSha256,
MessageType: types.MessageTypeDigest,
Message: digest[:],
}
out, err := client.Sign(context.Background(), input)
if err != nil {
return "", err
}
return base64.StdEncoding.EncodeToString(out.Signature), nil
}
func serializeBundle(bundle *api.PackageBundle) ([]byte, error) {
out, err := json.Marshal(bundle)
if err != nil {
return nil, err
}
raw := make(map[string]interface{})
err = json.Unmarshal(out, &raw)
if err != nil {
return nil, err
}
delete(raw, "status")
meta := raw["metadata"].(map[string]interface{})
for _, f := range generatedMetadataFields {
delete(meta, f)
}
return yaml.Marshal(raw)
}
| 201 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"reflect"
"testing"
"time"
"github.com/aws/aws-sdk-go-v2/service/ecrpublic"
ecrpublictypes "github.com/aws/aws-sdk-go-v2/service/ecrpublic/types"
"github.com/aws/aws-sdk-go-v2/service/sts"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
func TestNewBundleGenerate(t *testing.T) {
tests := []struct {
testname string
bundleName string
wantBundle *api.PackageBundle
}{
{
testname: "TestNewBundleGenerate",
bundleName: "bundlename",
wantBundle: &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: "PackageBundle",
APIVersion: "packages.eks.amazonaws.com/v1alpha1",
},
ObjectMeta: metav1.ObjectMeta{
Name: "bundlename",
Namespace: "eksa-packages",
Annotations: map[string]string{
"eksa.aws.com/excludes": "LnNwZWMucGFja2FnZXNbXS5zb3VyY2UucmVnaXN0cnkKLnNwZWMucGFja2FnZXNbXS5zb3VyY2UucmVwb3NpdG9yeQo=",
},
},
Spec: api.PackageBundleSpec{
Packages: []api.BundlePackage{
{
Name: "sample-package",
Source: api.BundlePackageSource{
Repository: "sample-Repository",
Versions: []api.SourceVersion{
{
Name: "v0.0",
Digest: "sha256:da25f5fdff88c259bb2ce7c0f1e9edddaf102dc4fb9cf5159ad6b902b5194e66",
},
},
},
},
},
},
},
},
}
for _, tc := range tests {
t.Run(tc.testname, func(tt *testing.T) {
got := NewBundleGenerate(tc.bundleName)
if !reflect.DeepEqual(got, tc.wantBundle) {
tt.Fatalf("GetClusterConfig() = %#v, want %#v", got, tc.wantBundle)
}
})
}
}
var testTagBundle string = "0.1.0_c4e25cb42e9bb88d2b8c2abfbde9f10ade39b214"
var testShaBundle string = "sha256:d5467083c4d175e7e9bba823e95570d28fff86a2fbccb03f5ec3093db6f039be"
var testImageMediaType string = "application/vnd.oci.image.manifest.v1+json"
var testRegistryId string = "public.ecr.aws/eks-anywhere"
var testRepositoryName string = "hello-eks-anywhere"
var testAccountID string = "123456702424"
func TestNewPackageFromInput(t *testing.T) {
client := newMockPublicRegistryClientBundle(nil)
stsclient := newMockSTSReleaseClient(nil)
tests := []struct {
client *mockPublicRegistryClientBundle
testname string
testproject Project
wantErr bool
wantBundle *api.BundlePackage
}{
{
testname: "Test no tags",
testproject: Project{
Name: "hello-eks-anywhere",
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []Tag{},
},
wantErr: true,
},
{
testname: "Test named tag",
testproject: Project{
Name: "hello-eks-anywhere",
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []Tag{
{Name: testTagBundle},
},
},
wantErr: false,
wantBundle: &api.BundlePackage{
Name: "hello-eks-anywhere",
Source: api.BundlePackageSource{
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []api.SourceVersion{
{
Name: testTagBundle,
Digest: testShaBundle,
},
},
},
},
},
{
testname: "Test 'latest' tag",
testproject: Project{
Name: "hello-eks-anywhere",
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []Tag{
{Name: "latest"},
},
},
wantErr: false,
wantBundle: &api.BundlePackage{
Name: "hello-eks-anywhere",
Source: api.BundlePackageSource{
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []api.SourceVersion{
{
Name: testTagBundle,
Digest: testShaBundle,
},
},
},
},
},
{
testname: "Test '-latest' in the middle of tag",
testproject: Project{
Name: "hello-eks-anywhere",
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []Tag{
{Name: "test-latest-helm"},
},
},
wantErr: false,
wantBundle: &api.BundlePackage{
Name: "hello-eks-anywhere",
Source: api.BundlePackageSource{
Repository: "hello-eks-anywhere",
Registry: "public.ecr.aws/eks-anywhere",
Versions: []api.SourceVersion{
{
Name: "test-latest-helm",
Digest: testShaBundle,
},
},
},
},
},
}
for _, tc := range tests {
t.Run(tc.testname, func(tt *testing.T) {
clients := &SDKClients{
ecrPublicClient: &ecrPublicClient{
publicRegistryClient: client,
},
stsClientRelease: &stsClient{
stsClientInterface: stsclient,
},
}
got, err := clients.NewPackageFromInput(tc.testproject)
if (err != nil) != tc.wantErr {
tt.Fatalf("NewPackageFromInput() error = %v, wantErr %v got %v", err, tc.wantErr, got)
}
if !reflect.DeepEqual(got, tc.wantBundle) {
tt.Fatalf("NewPackageFromInput() = %#v\n\n\n, want %#v", got, tc.wantBundle)
}
})
}
}
func TestIfSignature(t *testing.T) {
tests := []struct {
testname string
testbundle *api.PackageBundle
wantBool bool
}{
{
testname: "Test no annotations",
testbundle: &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: "1.20",
Namespace: "eksa-packages",
},
},
wantBool: false,
},
{
testname: "Test with annotations",
testbundle: &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: "1.20",
Namespace: "eksa-packages",
Annotations: map[string]string{
"eksa.aws.com/signature": "123",
},
},
},
wantBool: true,
},
}
for _, tc := range tests {
t.Run(tc.testname, func(tt *testing.T) {
got, err := IfSignature(tc.testbundle)
if err != nil {
tt.Fatalf("IfSignature() error = %v", err)
}
if got != tc.wantBool {
tt.Fatalf("IfSignature() = %#v\n\n\n, want %#v", got, tc.wantBool)
}
})
}
}
func TestCheckSignature(t *testing.T) {
tests := []struct {
testname string
testbundle *api.PackageBundle
signature string
wantBool bool
wantErr bool
}{
{
testname: "Test empty signature",
testbundle: &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: "1.20",
Namespace: "eksa-packages",
},
},
signature: "",
wantErr: true,
},
{
testname: "Test empty Bundle",
testbundle: nil,
signature: "signature-123",
wantErr: true,
},
{
testname: "Test same signature",
testbundle: &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: "1.20",
Namespace: "eksa-packages",
Annotations: map[string]string{
"eksa.aws.com/signature": "signature-123",
},
},
},
signature: "signature-123",
wantBool: true,
wantErr: false,
},
{
testname: "Test different signature",
testbundle: &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: api.PackageBundleKind,
APIVersion: api.SchemeBuilder.GroupVersion.String(),
},
ObjectMeta: metav1.ObjectMeta{
Name: "1.20",
Namespace: "eksa-packages",
Annotations: map[string]string{
"eksa.aws.com/signature": "signature-456",
},
},
},
signature: "signature-123",
wantBool: false,
wantErr: true,
},
}
for _, tc := range tests {
t.Run(tc.testname, func(tt *testing.T) {
got, err := CheckSignature(tc.testbundle, tc.signature)
if (err != nil) != tc.wantErr {
tt.Fatalf("CheckSignature() error = %v, wantErr %v", err, tc.wantErr)
}
if got != tc.wantBool {
tt.Fatalf("CheckSignature() = %#v\n\n\n, want %#v", got, tc.wantBool)
}
})
}
}
type mockPublicRegistryClientBundle struct {
err error
}
func newMockPublicRegistryClientBundle(err error) *mockPublicRegistryClientBundle {
return &mockPublicRegistryClientBundle{
err: err,
}
}
func (r *mockPublicRegistryClientBundle) DescribeImages(ctx context.Context, params *ecrpublic.DescribeImagesInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.DescribeImagesOutput, error) {
if r.err != nil {
return nil, r.err
}
testImagePushedAt := time.Now()
return &ecrpublic.DescribeImagesOutput{
ImageDetails: []ecrpublictypes.ImageDetail{
{
ImageDigest: &testShaBundle,
ImageTags: []string{testTagBundle},
ImageManifestMediaType: &testImageMediaType,
ImagePushedAt: &testImagePushedAt,
RegistryId: &testRegistryId,
RepositoryName: &testRepositoryName,
},
},
}, nil
}
func (r *mockPublicRegistryClientBundle) DescribeRegistries(ctx context.Context, params *ecrpublic.DescribeRegistriesInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.DescribeRegistriesOutput, error) {
panic("not implemented") // TODO: Implement
}
func (r *mockPublicRegistryClientBundle) GetAuthorizationToken(ctx context.Context, params *ecrpublic.GetAuthorizationTokenInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.GetAuthorizationTokenOutput, error) {
panic("not implemented") // TODO: Implement
}
type mockSTSReleaseClient struct {
err error
}
func newMockSTSReleaseClient(err error) *mockSTSReleaseClient {
return &mockSTSReleaseClient{
err: err,
}
}
func (r *mockSTSReleaseClient) GetCallerIdentity(ctx context.Context, params *sts.GetCallerIdentityInput, optFns ...func(*sts.Options)) (*sts.GetCallerIdentityOutput, error) {
if r.err != nil {
return nil, r.err
}
return &sts.GetCallerIdentityOutput{
Account: &testAccountID,
}, nil
}
| 378 |
eks-anywhere-packages | aws | Go | package main
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
// BundleGenerate same as Bundle except stripped down for generation of yaml file during generate bundleconfig
// +kubebuilder:object:generate=false
type BundleGenerate struct {
// TypeMeta metav1.TypeMeta `json:",inline"`
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
Spec api.PackageBundleSpec `json:"spec,omitempty"`
}
// SigningPackageBundle removes fields that shouldn't be included when signing.
type SigningPackageBundle struct {
*api.PackageBundle
// The fields below are to be modified or removed before signing.
// SigningObjectMeta removes fields that shouldn't be included when signing.
*SigningObjectMeta `json:"metadata,omitempty"`
// Status isn't relevant to a digital signature.
Status interface{} `json:"status,omitempty"`
}
// newSigningPackageBundle is api.PackageBundle using SigningObjectMeta instead of metav1.ObjectMeta
func newSigningPackageBundle(bundle *api.PackageBundle) *SigningPackageBundle {
return &SigningPackageBundle{
PackageBundle: bundle,
SigningObjectMeta: newSigningObjectMeta(&bundle.ObjectMeta),
Status: nil,
}
}
// SigningObjectMeta removes fields that shouldn't be included when signing.
type SigningObjectMeta struct {
*metav1.ObjectMeta
// The fields below are to be removed before signing.
// CreationTimestamp isn't relevant to a digital signature.
CreationTimestamp interface{} `json:"creationTimestamp,omitempty"`
}
// newSigningObjectMeta is metav1.ObjectMeta without the CreationTimestamp since it gets added the yaml as null otherwise.
func newSigningObjectMeta(meta *metav1.ObjectMeta) *SigningObjectMeta {
return &SigningObjectMeta{
ObjectMeta: meta,
CreationTimestamp: nil,
}
}
// Input is the schema for the input file
// +kubebuilder:object:root=true
// +kubebuilder:object:generate=false
type Input struct {
Packages []Org `json:"packages,omitempty"`
Name string `json:"name,omitempty"`
KubernetesVersion string `json:"kubernetesVersion,omitempty"`
// +kubebuilder:validation:Optional
// Minimum required packages controller version
MinVersion string `json:"minControllerVersion"`
}
// Org object containing the input file gitHub org and repo locations
type Org struct {
Org string `json:"org,omitempty"`
Projects []Project `json:"projects,omitempty"`
}
// Project is the object containing the project within the gitHub org, and the release tag
type Project struct {
Name string `json:"name,omitempty"`
Registry string `json:"registry,omitempty"`
Repository string `json:"repository,omitempty"`
Versions []Tag `json:"versions,omitempty"`
WorkloadOnly bool `json:"workloadonly,omitempty"`
CopyImages bool `json:"copyimages,omitempty"`
}
// Tag is the release tag
type Tag struct {
Name string `json:"name,omitempty"`
}
type Requires struct {
Kind string `json:"kind,omitempty"`
metav1.ObjectMeta `json:"metadata,omitempty"`
Spec RequiresSpec `json:"spec,omitempty"`
}
type RequiresSpec struct {
Images []Image `json:"images,omitempty"`
Configurations []Configuration `json:"configurations,omitempty"`
Schema string `json:"schema,omitempty"`
Dependencies []string `json:"dependencies,omitempty"`
}
type Configuration struct {
Name string `json:"name,omitempty"`
Required bool `json:"required,omitempty"`
Default string `json:"default,omitempty"`
}
type Image struct {
Repository string `json:"repository,omitempty"`
Tag string `json:"tag,omitempty"`
Digest string `json:"digest,omitempty"`
}
type DockerAuth struct {
Auths map[string]DockerAuthRegistry `json:"auths,omitempty"`
}
type DockerAuthRegistry struct {
Auth string `json:"auth"`
}
type DockerAuthFile struct {
Authfile string `json:"authfile"`
}
// Matches returns a list of inputs which align with ECR tags that exist
func (project Project) Matches(tag string) []string {
var matches []string
for _, version := range project.Versions {
if version.Name == tag {
matches = append(matches, version.Name)
}
}
return matches
}
| 140 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"encoding/json"
"fmt"
"os"
"regexp"
"strings"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/service/ecr"
ecrtypes "github.com/aws/aws-sdk-go-v2/service/ecr/types"
"github.com/pkg/errors"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
const (
ecrRegion = "us-west-2"
ecrPublicRegion = "us-east-1"
)
type ecrClient struct {
registryClient
AuthConfig string
}
type registryClient interface {
DescribeImages(ctx context.Context, params *ecr.DescribeImagesInput, optFns ...func(*ecr.Options)) (*ecr.DescribeImagesOutput, error)
GetAuthorizationToken(ctx context.Context, params *ecr.GetAuthorizationTokenInput, optFns ...func(*ecr.Options)) (*ecr.GetAuthorizationTokenOutput, error)
}
type CheckECR interface {
tagExistsInRepository(repository, tag string) (bool, error)
shaExistsInRepository(repository, tag string) (bool, error)
}
// NewECRClient Creates a new ECR Client client
func NewECRClient(client registryClient, needsCreds bool) (*ecrClient, error) {
ecrClient := &ecrClient{
registryClient: client,
}
if needsCreds {
authorizationToken, err := ecrClient.GetAuthToken()
if err != nil {
return nil, err
}
ecrClient.AuthConfig = authorizationToken
return ecrClient, nil
}
return ecrClient, nil
}
// Describe returns a list of ECR describe results, with Pagination from DescribeImages SDK request
func (c *ecrClient) Describe(describeInput *ecr.DescribeImagesInput) ([]ecrtypes.ImageDetail, error) {
var images []ecrtypes.ImageDetail
resp, err := c.DescribeImages(context.TODO(), describeInput)
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR. %s", err)
}
images = append(images, resp.ImageDetails...)
if resp.NextToken != nil {
next := describeInput
next.NextToken = resp.NextToken
nextdetails, _ := c.Describe(next)
images = append(images, nextdetails...)
}
return images, nil
}
// GetShaForInputs returns a list of an images version/sha for given inputs to lookup
func (c *ecrClient) GetShaForInputs(project Project) ([]api.SourceVersion, error) {
sourceVersion := []api.SourceVersion{}
for _, tag := range project.Versions {
if !strings.HasSuffix(tag.Name, "latest") {
var imagelookup []ecrtypes.ImageIdentifier
imagelookup = append(imagelookup, ecrtypes.ImageIdentifier{ImageTag: &tag.Name})
ImageDetails, err := c.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(project.Repository),
ImageIds: imagelookup,
})
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
for _, images := range ImageDetails {
if *images.ImageManifestMediaType != "application/vnd.oci.image.manifest.v1+json" || len(images.ImageTags) == 0 {
continue
}
if len(images.ImageTags) > 0 {
v := &api.SourceVersion{Name: tag.Name, Digest: *images.ImageDigest}
sourceVersion = append(sourceVersion, *v)
continue
}
}
}
//
if tag.Name == "latest" {
ImageDetails, err := c.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(project.Repository),
})
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, _ := createECRImageDetails(ImageDetailsECR{PrivateImageDetails: image})
images = append(images, details)
}
sha, err := getLastestImageSha(images)
if err != nil {
return nil, err
}
sourceVersion = append(sourceVersion, *sha)
continue
}
//
if strings.HasSuffix(tag.Name, "-latest") {
regex := regexp.MustCompile(`-latest`)
splitVersion := regex.Split(tag.Name, -1) //extract out the version without the latest
ImageDetails, err := c.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(project.Repository),
})
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, _ := createECRImageDetails(ImageDetailsECR{PrivateImageDetails: image})
images = append(images, details)
}
filteredImageDetails := ImageTagFilter(images, splitVersion[0])
sha, err := getLastestImageSha(filteredImageDetails)
if err != nil {
return nil, err
}
sourceVersion = append(sourceVersion, *sha)
continue
}
}
sourceVersion = removeDuplicates(sourceVersion)
return sourceVersion, nil
}
// tagFromSha Looks up the Tag of an ECR artifact from a sha
func (c *ecrClient) tagFromSha(repository, sha, substringTag string) (string, error) {
if repository == "" || sha == "" {
return "", fmt.Errorf("Emtpy repository, or sha passed to the function")
}
var imagelookup []ecrtypes.ImageIdentifier
imagelookup = append(imagelookup, ecrtypes.ImageIdentifier{ImageDigest: &sha})
ImageDetails, err := c.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(repository),
ImageIds: imagelookup,
})
if err != nil {
if strings.Contains(err.Error(), "does not exist within the repository") == true {
return "", nil
} else {
return "", fmt.Errorf("looking up image details %v", err)
}
}
for _, detail := range ImageDetails {
// We can return the first tag for an image, if it has multiple tags
if len(detail.ImageTags) > 0 {
detail.ImageTags = removeStringSlice(detail.ImageTags, "latest")
for j, tag := range detail.ImageTags {
if strings.HasSuffix(tag, substringTag) {
return detail.ImageTags[j], nil
}
}
return detail.ImageTags[0], nil
}
}
return "", nil
}
// GetAuthToken gets an authorization token from ECR
func (c *ecrClient) GetAuthToken() (string, error) {
authTokenOutput, err := c.GetAuthorizationToken(context.TODO(), &ecr.GetAuthorizationTokenInput{})
if err != nil {
return "", errors.Cause(err)
}
authToken := *authTokenOutput.AuthorizationData[0].AuthorizationToken
return authToken, nil
}
// NewAuthFile writes a new Docker Authfile from the DockerAuth struct which a user to be used by Skopeo or Helm.
func NewAuthFile(dockerstruct *DockerAuth) (DockerAuthFile, error) {
jsonbytes, err := json.Marshal(*dockerstruct)
auth := DockerAuthFile{}
if err != nil {
return auth, fmt.Errorf("Marshalling docker auth file to json %w", err)
}
f, err := os.CreateTemp("", "dockerAuth")
if err != nil {
return auth, fmt.Errorf("Creating tempfile %w", err)
}
defer f.Close()
fmt.Fprint(f, string(jsonbytes))
auth.Authfile = f.Name()
return auth, nil
}
func (d DockerAuthFile) Remove() error {
if d.Authfile == "" {
return fmt.Errorf("No Authfile in DockerAuthFile given")
}
defer os.Remove(d.Authfile)
return nil
}
// getNameAndVersion looks up the latest pushed helm chart's tag from a given repo name from ECR.
func (c *SDKClients) getNameAndVersion(repoName, tag, accountID string) (string, string, string, error) {
var version string
var sha string
splitname := strings.Split(repoName, ":") // TODO add a regex filter
name := splitname[0]
ecrname := fmt.Sprintf("%s.dkr.ecr.us-west-2.amazonaws.com/%s", accountID, name)
if len(splitname) > 0 {
// If for promotion, we use a named tag instead of latest we do a lookup for that tag.
if !strings.HasSuffix(tag, "latest") {
imageIDs := []ecrtypes.ImageIdentifier{{ImageTag: &tag}}
ImageDetails, err := c.ecrClient.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(repoName),
ImageIds: imageIDs,
})
if err != nil {
return "", "", "", fmt.Errorf("DescribeImagesRequest to public ECR failed: %w", err)
}
if len(ImageDetails) == 1 {
return ecrname, tag, *ImageDetails[0].ImageDigest, nil
}
}
// If tag is -latest we do a timestamp lookup
if tag == "latest" {
ImageDetails, err := c.ecrClient.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(repoName),
})
if err != nil {
return "", "", "", err
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, err := createECRImageDetails(ImageDetailsECR{PrivateImageDetails: image})
if err != nil {
return "", "", "", err
}
images = append(images, details)
}
version, sha, err = getLastestHelmTagandSha(images)
return ecrname, version, sha, err
}
// If tag contains -latest we do timestamp lookup of any tags matching a regexp of the specified tag.
if strings.Contains(tag, "-latest") {
regex := regexp.MustCompile(`-latest`)
splitVersion := regex.Split(tag, -1) //extract out the version without the latest
ImageDetails, err := c.ecrClient.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(repoName),
})
if err != nil {
return "", "", "", fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, _ := createECRImageDetails(ImageDetailsECR{PrivateImageDetails: image})
images = append(images, details)
}
filteredImageDetails := ImageTagFilter(images, splitVersion[0])
version, sha, err = getLastestHelmTagandSha(filteredImageDetails)
if err != nil {
return "", "", "", err
}
return ecrname, version, sha, err
}
}
return "", "", "", fmt.Errorf("invalid repository: %q", repoName)
}
// shaExistsInRepository checks if a given OCI artifact exists in a destination repo using the sha sum.
func (c *ecrClient) shaExistsInRepository(repository, sha string) (bool, error) {
if repository == "" || sha == "" {
return false, fmt.Errorf("Emtpy repository, or sha passed to the function")
}
var imagelookup []ecrtypes.ImageIdentifier
imagelookup = append(imagelookup, ecrtypes.ImageIdentifier{ImageDigest: &sha})
ImageDetails, err := c.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(repository),
ImageIds: imagelookup,
})
if err != nil {
if strings.Contains(err.Error(), "does not exist within the repository") == true {
return false, nil
}
}
for _, detail := range ImageDetails {
if detail.ImageDigest != nil && *detail.ImageDigest == sha {
return true, nil
}
}
return false, nil
}
// tagExistsInRepository checks if a given OCI artifact exists in a destination repo using the sha sum.
func (c *ecrClient) tagExistsInRepository(repository, tag string) (bool, error) {
if repository == "" || tag == "" {
return false, fmt.Errorf("Emtpy repository, or tag passed to the function")
}
var imagelookup []ecrtypes.ImageIdentifier
imagelookup = append(imagelookup, ecrtypes.ImageIdentifier{ImageTag: &tag})
ImageDetails, err := c.Describe(&ecr.DescribeImagesInput{
RepositoryName: aws.String(repository),
ImageIds: imagelookup,
})
if err != nil {
if strings.Contains(err.Error(), "does not exist within the repository") == true {
return false, nil
}
}
for _, detail := range ImageDetails {
for _, Imagetag := range detail.ImageTags {
if tag == Imagetag {
return true, nil
}
}
}
return false, nil
}
| 329 |
eks-anywhere-packages | aws | Go | package main
import (
"fmt"
"os/exec"
"reflect"
"strings"
"time"
ecrtypes "github.com/aws/aws-sdk-go-v2/service/ecr/types"
ecrpublictypes "github.com/aws/aws-sdk-go-v2/service/ecrpublic/types"
"github.com/go-logr/logr"
"github.com/jinzhu/copier"
"github.com/pkg/errors"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
// removeDuplicates removes any duplicates from Version list, useful for scenarios when
// multiple tags for an image are present, this would cause duplicates on the bundle CRD,
// so we remove the first one in this case since they are the same thing.
// EX sha1234 is tagged 1.1 and 1.2 and sha5678 is tagged 1.2 this would result in a double match of 1.2 so we run this.
func removeDuplicates(s []api.SourceVersion) []api.SourceVersion {
k := make(map[string]bool)
l := []api.SourceVersion{}
for _, i := range s {
if _, j := k[i.Name]; !j {
k[i.Name] = true
l = append(l, api.SourceVersion{Name: i.Name, Digest: i.Digest})
}
}
return l
}
// stringInSlice checks to see if a string is in a slice
func stringInSlice(a string, list []string) bool {
for _, b := range list {
if b == a {
return true
}
}
return false
}
// removeStringSlice removes a named string from a slice, without knowing it's index or it being ordered.
func removeStringSlice(l []string, item string) []string {
for i, other := range l {
if other == item {
return append(l[:i], l[i+1:]...)
}
}
return l
}
func deleteEmptyStringSlice(s []string) []string {
var r []string
for _, str := range s {
if str != "" {
r = append(r, str)
}
}
return r
}
func printSlice[v any](s []v) {
if len(s) == 0 {
return
}
fmt.Println(s[0])
printSlice(s[1:])
}
func printMap[k comparable, v any](m map[k]v) {
if len(m) == 0 {
return
}
for k, v := range m {
fmt.Println(k, ":", v)
}
}
// ExecCommand runs a given command, and constructs the log/output.
func ExecCommand(cmd *exec.Cmd) (string, error) {
stdout, err := cmd.Output()
if err != nil {
return string(stdout), errors.Cause(err)
}
return string(stdout), nil
}
// splitECRName is a helper function where some ECR repo's are formatted with "org/repo", and for aws repos it's just "repo"
func splitECRName(s string) (string, string, error) {
chartNameList := strings.Split(s, "/")
// Scenarios for ECR Public which contain and extra "/"
if strings.Contains(chartNameList[0], "public.ecr.aws") {
return strings.Join(chartNameList[2:], "/"), chartNameList[len(chartNameList)-1], nil
}
if len(chartNameList) > 1 {
return strings.Join(chartNameList[1:], "/"), chartNameList[len(chartNameList)-1], nil
}
return "", "", fmt.Errorf("Error: %s", "Failed parsing chartName, check the input URI is a valid ECR URI")
}
// imageTagFilter is used when filtering a list of images for a specific tag or tag substring
func ImageTagFilter(details []ImageDetailsBothECR, version string) []ImageDetailsBothECR {
var filteredDetails []ImageDetailsBothECR
for _, detail := range details {
for _, tag := range detail.ImageTags {
if strings.HasPrefix(tag, version) {
filteredDetails = append(filteredDetails, detail)
}
}
}
return filteredDetails
}
type ImageDetailsECR struct {
PrivateImageDetails ecrtypes.ImageDetail
PublicImageDetails ecrpublictypes.ImageDetail
}
// ImageDetailsBothECR is used so we can share some functions between private and public ECR bundle creation.
type ImageDetailsBothECR struct {
// The sha256 digest of the image manifest.
ImageDigest *string `copier:"ImageDigest"`
// The media type of the image manifest.
ImageManifestMediaType *string `copier:"ImageManifestMediaType"`
// The date and time, expressed in standard JavaScript date format, at which the
// current image was pushed to the repository.
ImagePushedAt *time.Time `copier:"ImagePushedAt"`
// The list of tags associated with this image.
ImageTags []string `copier:"ImageTags"`
// The Amazon Web Services account ID associated with the registry to which this
// image belongs.
RegistryId *string `copier:"RegistryId"`
// The name of the repository to which this image belongs.
RepositoryName *string `copier:"RepositoryName"`
}
func createECRImageDetails(images ImageDetailsECR) (ImageDetailsBothECR, error) {
t := &ImageDetailsBothECR{}
//Check for empty structs, if non empty copy to new common struct for ECR imagedetails.
if reflect.DeepEqual(images.PublicImageDetails, ecrpublictypes.ImageDetail{}) {
if images.PrivateImageDetails.ImageDigest != nil && images.PrivateImageDetails.ImagePushedAt != nil && images.PrivateImageDetails.RegistryId != nil && images.PrivateImageDetails.RepositoryName != nil {
copier.Copy(&t, &images.PrivateImageDetails)
return *t, nil
}
return ImageDetailsBothECR{}, fmt.Errorf("Error marshalling image details from ECR lookup.")
}
if reflect.DeepEqual(images.PrivateImageDetails, ecrtypes.ImageDetail{}) {
if images.PublicImageDetails.ImageDigest != nil && images.PublicImageDetails.ImagePushedAt != nil && images.PublicImageDetails.RegistryId != nil && images.PublicImageDetails.RepositoryName != nil {
copier.Copy(&t, &images.PublicImageDetails)
return *t, nil
}
return ImageDetailsBothECR{}, fmt.Errorf("Error marshalling image details from ECR lookup.")
}
return ImageDetailsBothECR{}, fmt.Errorf("Error no data passed to createImageDetails")
}
// getLastestHelmTagandSha Iterates list of ECR Helm Charts, to find latest pushed image and return tag/sha of the latest pushed image
func getLastestHelmTagandSha(details []ImageDetailsBothECR) (string, string, error) {
var latest ImageDetailsBothECR
latest.ImagePushedAt = &time.Time{}
for _, detail := range details {
if len(details) < 1 || detail.ImagePushedAt == nil || detail.ImageDigest == nil || detail.ImageTags == nil || len(detail.ImageTags) == 0 || *detail.ImageManifestMediaType != "application/vnd.oci.image.manifest.v1+json" {
continue
}
if detail.ImagePushedAt != nil && latest.ImagePushedAt.Before(*detail.ImagePushedAt) {
latest = detail
}
}
// Check if latest is equal to empty struct, and return error if that's the case.
if reflect.DeepEqual(latest, ImageDetailsBothECR{}) {
return "", "", fmt.Errorf("error no images found")
}
return latest.ImageTags[0], *latest.ImageDigest, nil
}
// getLastestImageSha Iterates list of ECR Public Helm Charts, to find latest pushed image and return tag/sha of the latest pushed image
func getLastestImageSha(details []ImageDetailsBothECR) (*api.SourceVersion, error) {
var latest ImageDetailsBothECR
latest.ImagePushedAt = &time.Time{}
for _, detail := range details {
if len(details) < 1 || detail.ImagePushedAt == nil || detail.ImageDigest == nil || detail.ImageTags == nil || len(detail.ImageTags) == 0 || *detail.ImageManifestMediaType != "application/vnd.oci.image.manifest.v1+json" {
continue
}
if detail.ImagePushedAt != nil && latest.ImagePushedAt.Before(*detail.ImagePushedAt) {
latest = detail
}
}
// Check if latest is equal to empty struct, and return error if that's the case.
if reflect.DeepEqual(latest, ecrpublictypes.ImageDetail{}) {
return nil, fmt.Errorf("error no images found")
}
return &api.SourceVersion{Name: latest.ImageTags[0], Digest: *latest.ImageDigest}, nil
}
// copyImage will copy an OCI artifact from one registry to another registry.
func copyImage(log logr.Logger, authFile, source, destination string) error {
log.Info("Running skopeo copy...", source, destination)
cmd := exec.Command("skopeo", "copy", "--authfile", authFile, source, destination, "-f", "oci", "--all")
stdout, err := ExecCommand(cmd)
fmt.Printf("%s\n", stdout)
if err != nil {
return err
}
return nil
}
| 214 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"fmt"
"regexp"
"strings"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/service/ecrpublic"
ecrpublictypes "github.com/aws/aws-sdk-go-v2/service/ecrpublic/types"
"github.com/pkg/errors"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
type ecrPublicClient struct {
publicRegistryClient
AuthConfig string
SourceRegistry string
}
type publicRegistryClient interface {
DescribeImages(ctx context.Context, params *ecrpublic.DescribeImagesInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.DescribeImagesOutput, error)
DescribeRegistries(ctx context.Context, params *ecrpublic.DescribeRegistriesInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.DescribeRegistriesOutput, error)
GetAuthorizationToken(ctx context.Context, params *ecrpublic.GetAuthorizationTokenInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.GetAuthorizationTokenOutput, error)
}
// NewECRPublicClient Creates a new ECR Client Public client
func NewECRPublicClient(client publicRegistryClient, needsCreds bool) (*ecrPublicClient, error) {
ecrPublicClient := &ecrPublicClient{
publicRegistryClient: client,
}
if needsCreds {
authorizationToken, err := ecrPublicClient.GetPublicAuthToken()
if err != nil {
return nil, err
}
ecrPublicClient.AuthConfig = authorizationToken
return ecrPublicClient, nil
}
return ecrPublicClient, nil
}
// Describe returns a list of ECR describe results, with Pagination from DescribeImages SDK request
func (c *ecrPublicClient) DescribePublic(describeInput *ecrpublic.DescribeImagesInput) ([]ecrpublictypes.ImageDetail, error) {
var images []ecrpublictypes.ImageDetail
resp, err := c.DescribeImages(context.TODO(), describeInput)
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
images = append(images, resp.ImageDetails...)
if resp.NextToken != nil {
next := describeInput
next.NextToken = resp.NextToken
nextdetails, _ := c.DescribePublic(next)
images = append(images, nextdetails...)
}
return images, nil
}
// GetShaForPublicInputs returns a list of an images version/sha for given inputs to lookup
func (c *SDKClients) GetShaForPublicInputs(project Project) ([]api.SourceVersion, error) {
sourceVersion := []api.SourceVersion{}
for _, tag := range project.Versions {
if !strings.HasSuffix(tag.Name, "latest") {
var imagelookup []ecrpublictypes.ImageIdentifier
imagelookup = append(imagelookup, ecrpublictypes.ImageIdentifier{ImageTag: &tag.Name})
ImageDetails, err := c.ecrPublicClient.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(project.Repository),
ImageIds: imagelookup,
RegistryId: &c.stsClientRelease.AccountID,
})
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
for _, images := range ImageDetails {
if *images.ImageManifestMediaType != "application/vnd.oci.image.manifest.v1+json" || len(images.ImageTags) == 0 {
continue
}
if len(images.ImageTags) > 0 {
v := &api.SourceVersion{Name: tag.Name, Digest: *images.ImageDigest}
sourceVersion = append(sourceVersion, *v)
continue
}
}
}
//
if tag.Name == "latest" {
ImageDetails, err := c.ecrPublicClient.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(project.Repository),
})
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, _ := createECRImageDetails(ImageDetailsECR{PublicImageDetails: image})
images = append(images, details)
}
sha, err := getLastestImageSha(images)
if err != nil {
return nil, err
}
sourceVersion = append(sourceVersion, *sha)
continue
}
//
if strings.HasSuffix(tag.Name, "-latest") {
regex := regexp.MustCompile(`-latest`)
splitVersion := regex.Split(tag.Name, -1) //extract out the version without the latest
ImageDetails, err := c.ecrPublicClient.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(project.Repository),
})
if err != nil {
return nil, fmt.Errorf("error: Unable to complete DescribeImagesRequest to ECR public. %s", err)
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, _ := createECRImageDetails(ImageDetailsECR{PublicImageDetails: image})
images = append(images, details)
}
filteredImageDetails := ImageTagFilter(images, splitVersion[0])
sha, err := getLastestImageSha(filteredImageDetails)
if err != nil {
return nil, err
}
sourceVersion = append(sourceVersion, *sha)
continue
}
}
sourceVersion = removeDuplicates(sourceVersion)
return sourceVersion, nil
}
// shaExistsInRepositoryPublic checks if a given OCI artifact exists in a destination repo using the sha sum.
func (c *ecrPublicClient) shaExistsInRepository(repository, sha string) (bool, error) {
if repository == "" || sha == "" {
return false, fmt.Errorf("Emtpy repository, or sha passed to the function")
}
var imagelookup []ecrpublictypes.ImageIdentifier
imagelookup = append(imagelookup, ecrpublictypes.ImageIdentifier{ImageDigest: &sha})
ImageDetails, err := c.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(repository),
ImageIds: imagelookup,
})
if err != nil {
if strings.Contains(err.Error(), "does not exist within the repository") == true {
return false, nil
}
}
for _, detail := range ImageDetails {
if detail.ImageDigest != nil && *detail.ImageDigest == sha {
return true, nil
}
}
return false, nil
}
// tagExistsInRepository checks if a given OCI artifact exists in a destination repo using the sha sum.
func (c *ecrPublicClient) tagExistsInRepository(repository, tag string) (bool, error) {
if repository == "" || tag == "" {
return false, fmt.Errorf("Emtpy repository, or tag passed to the function")
}
var imagelookup []ecrpublictypes.ImageIdentifier
imagelookup = append(imagelookup, ecrpublictypes.ImageIdentifier{ImageTag: &tag})
ImageDetails, err := c.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(repository),
ImageIds: imagelookup,
})
if err != nil {
if strings.Contains(err.Error(), "does not exist within the repository") == true {
return false, nil
}
}
for _, detail := range ImageDetails {
for _, Imagetag := range detail.ImageTags {
if tag == Imagetag {
return true, nil
}
}
}
return false, nil
}
// GetRegistryURI gets the current account's AWS ECR Public registry URI
func (c *ecrPublicClient) GetRegistryURI() (string, error) {
registries, err := c.DescribeRegistries(context.TODO(), (&ecrpublic.DescribeRegistriesInput{}))
if err != nil {
return "", err
}
if len(registries.Registries) > 0 && registries.Registries[0].RegistryUri != nil && *registries.Registries[0].RegistryUri != "" {
return *registries.Registries[0].RegistryUri, nil
}
return "", fmt.Errorf("Emtpy list of registries for the account")
}
// GetPublicAuthToken gets an authorization token from ECR public
func (c *ecrPublicClient) GetPublicAuthToken() (string, error) {
authTokenOutput, err := c.GetAuthorizationToken(context.TODO(), &ecrpublic.GetAuthorizationTokenInput{})
if err != nil {
return "", errors.Cause(err)
}
authToken := *authTokenOutput.AuthorizationData.AuthorizationToken
return authToken, nil
}
// getNameAndVersionPublic looks up the latest pushed helm chart's tag from a given repo name Full name in Public ECR OCI format.
func (c *SDKClients) getNameAndVersionPublic(repoName, tag, registryURI string) (string, string, string, error) {
var version string
var sha string
splitname := strings.Split(repoName, ":") // TODO add a regex filter
name := splitname[0]
ecrname := fmt.Sprintf("%s/%s", c.ecrPublicClient.SourceRegistry, name)
if len(splitname) > 0 {
if !strings.HasSuffix(tag, "latest") {
imageIDs := []ecrpublictypes.ImageIdentifier{{ImageTag: &tag}}
ImageDetails, err := c.ecrPublicClient.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(repoName),
ImageIds: imageIDs,
})
if err != nil {
return "", "", "", fmt.Errorf("DescribeImagesRequest to public ECR failed: %w", err)
}
if len(ImageDetails) == 1 {
return ecrname, tag, *ImageDetails[0].ImageDigest, nil
}
}
ImageDetails, err := c.ecrPublicClient.DescribePublic(&ecrpublic.DescribeImagesInput{
RepositoryName: aws.String(repoName),
})
if err != nil {
return "", "", "", err
}
var images []ImageDetailsBothECR
for _, image := range ImageDetails {
details, err := createECRImageDetails(ImageDetailsECR{PublicImageDetails: image})
if err != nil {
return "", "", "", err
}
images = append(images, details)
}
version, sha, err = getLastestHelmTagandSha(images)
if err != nil {
return "", "", "", err
}
ecrname := fmt.Sprintf("%s/%s", c.ecrPublicClient.SourceRegistry, name)
return ecrname, version, sha, err
}
return "", "", "", fmt.Errorf("invalid repository: %q", repoName)
}
| 254 |
eks-anywhere-packages | aws | Go | package main
import (
"archive/tar"
"compress/gzip"
"context"
"io"
"os"
"testing"
"github.com/aws/aws-sdk-go-v2/service/ecr"
ecrtypes "github.com/aws/aws-sdk-go-v2/service/ecr/types"
"github.com/aws/aws-sdk-go-v2/service/ecrpublic"
ecrpublictypes "github.com/aws/aws-sdk-go-v2/service/ecrpublic/types"
)
func TestSplitECRName(t *testing.T) {
tests := []struct {
testName string
testHelmName string
chartName string
helmName string
wantErr bool
}{
{
testName: "Test empty name",
testHelmName: "",
chartName: "",
helmName: "",
wantErr: true,
},
{
testName: "Test valid name no prefix",
testHelmName: "646717423341.dkr.ecr.us-west-2.amazonaws.com/hello-eks-anywhere",
chartName: "hello-eks-anywhere",
helmName: "hello-eks-anywhere",
wantErr: false,
},
{
testName: "Test valid name w/ 1 prefix",
testHelmName: "646717423341.dkr.ecr.us-west-2.amazonaws.com/hello-eks-anywhere",
chartName: "hello-eks-anywhere",
helmName: "hello-eks-anywhere",
wantErr: false,
},
{
testName: "Test valid name w/ 2 prefixes",
testHelmName: "646717423341.dkr.ecr.us-west-2.amazonaws.com/test/hello-eks-anywhere",
chartName: "test/hello-eks-anywhere",
helmName: "hello-eks-anywhere",
wantErr: false,
},
{
testName: "Test valid name w/ 3 prefixes",
testHelmName: "646717423341.dkr.ecr.us-west-2.amazonaws.com/test/testing/hello-eks-anywhere",
chartName: "test/testing/hello-eks-anywhere",
helmName: "hello-eks-anywhere",
wantErr: false,
},
{
testName: "Test valid name w/ 4 prefixes",
testHelmName: "646717423341.dkr.ecr.us-west-2.amazonaws.com/test/tested/testing/hello-eks-anywhere",
chartName: "test/tested/testing/hello-eks-anywhere",
helmName: "hello-eks-anywhere",
wantErr: false,
},
}
for _, tc := range tests {
t.Run(tc.testName, func(tt *testing.T) {
got, got2, err := splitECRName(tc.testHelmName)
if (err != nil) != tc.wantErr {
tt.Fatalf("splitECRName() error = %v, wantErr %v", err, tc.wantErr)
}
if got != tc.chartName || got2 != tc.helmName {
tt.Fatalf("splitECRName() = %#v\n\n\n, want %#v %#v", got, tc.chartName, tc.helmName)
}
})
}
}
func TestUnTarHelmChart(t *testing.T) {
//Construct a Valid temp Helm Chart and Targz it.
var tarGZ string = "test.tgz"
err := os.Mkdir("hello-eks-anywhere", 0750)
if err != nil {
t.Fatal("Error creating test dir:", err)
}
defer os.RemoveAll("hello-eks-anywhere")
f, err := os.Create("hello-eks-anywhere/Chart.yaml")
content := []byte("apiVersion: v2\nversion: 0.1.0\nappVersion: 0.1.0\nname: hello-eks-anywhere\n")
err = os.WriteFile("hello-eks-anywhere/Chart.yaml", content, 0644)
if err != nil {
t.Fatal("Error creating test files:", err)
}
defer f.Close()
out, err := os.Create(tarGZ)
if err != nil {
t.Fatal("Error creating test .tar:", err)
}
defer out.Close()
files := []string{f.Name()}
err = createArchive(files, out)
if err != nil {
t.Fatal("Error adding files to .tar:", err)
}
defer os.Remove(tarGZ)
tests := []struct {
testName string
testChartPath string
testChartName string
dest string
wantErr bool
}{
{
testName: "Test empty ChartPath",
testChartPath: "",
testChartName: "hello-eks-anywhere",
wantErr: true,
},
{
testName: "Test empty ChartName",
testChartPath: tarGZ,
testChartName: "",
wantErr: true,
},
{
testName: "Test valid values",
testChartPath: tarGZ,
testChartName: "hello-eks-anywhere",
wantErr: false,
},
}
for _, tc := range tests {
tempDir := t.TempDir()
t.Run(tc.testName, func(tt *testing.T) {
err := UnTarHelmChart(tc.testChartPath, tc.testChartName, tempDir)
if (err != nil) != tc.wantErr {
tt.Fatalf("UnTarHelmChart() error = %v, wantErr %v", err, tc.wantErr)
}
})
}
}
func TestShaExistsInRepository(t *testing.T) {
client := newMockPublicRegistryClient(nil)
tests := []struct {
client *mockPublicRegistryClient
testName string
testRepository string
testVersion string
checkPass bool
wantErr bool
}{
{
testName: "Test empty Repository",
testRepository: "",
testVersion: "sha256:0526725a65691944e831add6b247b25a93b8eeb1033dddadeaa089e95b021172",
wantErr: true,
},
{
testName: "Test empty Version",
testRepository: "hello-eks-anywhere",
testVersion: "",
wantErr: true,
},
{
testName: "Test valid Repository and Version",
testRepository: "hello-eks-anywhere",
testVersion: "sha256:0526725a65691944e831add6b247b25a93b8eeb1033dddadeaa089e95b021172",
checkPass: true,
wantErr: false,
},
}
for _, tc := range tests {
t.Run(tc.testName, func(tt *testing.T) {
clients := &SDKClients{
ecrPublicClient: &ecrPublicClient{
publicRegistryClient: client,
},
}
got, err := clients.ecrPublicClient.shaExistsInRepository(tc.testRepository, tc.testVersion)
if (err != nil) != tc.wantErr {
tt.Fatalf("shaExistsInRepositoryPublic() error = %v, wantErr %v", err, tc.wantErr)
}
if got != tc.checkPass {
tt.Fatalf("shaExistsInRepositoryPublic() = %#v\n\n\n, want %#v", got, tc.checkPass)
}
})
}
}
func TestTagFromSha(t *testing.T) {
client := newMockRegistryClient(nil)
tests := []struct {
client *mockRegistryClient
testName string
testRepository string
testDigest string
testSubstringTag string
checkVersion string
wantErr bool
}{
{
testName: "Test empty Repository",
testRepository: "",
testDigest: "sha256:0526725a65691944e831add6b247b25a93b8eeb1033dddadeaa089e95b021172",
testSubstringTag: "",
wantErr: true,
},
{
testName: "Test empty Version",
testRepository: "hello-eks-anywhere",
testDigest: "",
testSubstringTag: "",
wantErr: true,
},
{
testName: "Test valid Repository and Version",
testRepository: "hello-eks-anywhere",
testDigest: "sha256:0526725a65691944e831add6b247b25a93b8eeb1033dddadeaa089e95b021172",
testSubstringTag: "v0.1.1-baa4ef89fe91d65d3501336d95b680f8ae2ea660",
checkVersion: "v0.1.1-baa4ef89fe91d65d3501336d95b680f8ae2ea660",
wantErr: false,
},
{
testName: "Test valid Repository and substring Version",
testRepository: "hello-eks-anywhere",
testDigest: "sha256:0526725a65691944e831add6b247b25a93b8eeb1033dddadeaa089e95b021172",
testSubstringTag: "v0.1.1",
checkVersion: "v0.1.1-baa4ef89fe91d65d3501336d95b680f8ae2ea660",
wantErr: false,
},
}
//images.Digest, err = ecrClient.tagFromSha(images.Repository, images.Digest)
for _, tc := range tests {
t.Run(tc.testName, func(tt *testing.T) {
clients := &SDKClients{
ecrClient: &ecrClient{
registryClient: client,
},
}
got, err := clients.ecrClient.tagFromSha(tc.testRepository, tc.testDigest, tc.checkVersion)
if (err != nil) != tc.wantErr {
tt.Fatalf("tagFromSha() error = %v, wantErr %v", err, tc.wantErr)
}
if got != tc.checkVersion {
tt.Fatalf("tagFromSha() = %#v\n\n\n, want %#v", got, tc.checkVersion)
}
})
}
}
//Helper funcions
// to create the mocks "impl 'r *mockRegistryClient' registryClient"
type mockPublicRegistryClient struct {
err error
}
func newMockPublicRegistryClient(err error) *mockPublicRegistryClient {
return &mockPublicRegistryClient{
err: err,
}
}
var testSha string = "sha256:0526725a65691944e831add6b247b25a93b8eeb1033dddadeaa089e95b021172"
func (r *mockPublicRegistryClient) DescribeImages(ctx context.Context, params *ecrpublic.DescribeImagesInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.DescribeImagesOutput, error) {
if r.err != nil {
return nil, r.err
}
return &ecrpublic.DescribeImagesOutput{
ImageDetails: []ecrpublictypes.ImageDetail{
{
ImageDigest: &testSha,
},
},
}, nil
}
func (r *mockPublicRegistryClient) DescribeRegistries(ctx context.Context, params *ecrpublic.DescribeRegistriesInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.DescribeRegistriesOutput, error) {
panic("not implemented") // TODO: Implement
}
func (r *mockPublicRegistryClient) GetAuthorizationToken(ctx context.Context, params *ecrpublic.GetAuthorizationTokenInput, optFns ...func(*ecrpublic.Options)) (*ecrpublic.GetAuthorizationTokenOutput, error) {
panic("not implemented") // TODO: Implement
}
// ECR
type mockRegistryClient struct {
err error
}
func newMockRegistryClient(err error) *mockRegistryClient {
return &mockRegistryClient{
err: err,
}
}
var testTag1 string = "v0.1.1-baa4ef89fe91d65d3501336d95b680f8ae2ea660"
var testTag2 string = "v0.1.1-baa4ef89fe91d65d3501336d95b680f8ae2ea661"
func (r *mockRegistryClient) DescribeImages(ctx context.Context, params *ecr.DescribeImagesInput, optFns ...func(*ecr.Options)) (*ecr.DescribeImagesOutput, error) {
if r.err != nil {
return nil, r.err
}
return &ecr.DescribeImagesOutput{
ImageDetails: []ecrtypes.ImageDetail{
{
ImageTags: []string{testTag1, testTag2},
},
},
}, nil
}
func (r *mockRegistryClient) GetAuthorizationToken(ctx context.Context, params *ecr.GetAuthorizationTokenInput, optFns ...func(*ecr.Options)) (*ecr.GetAuthorizationTokenOutput, error) {
panic("not implemented") // TODO: Implement
}
func createArchive(files []string, buf io.Writer) error {
// Create new Writers for gzip and tar
// These writers are chained. Writing to the tar writer will
// write to the gzip writer which in turn will write to
// the "buf" writer
gw := gzip.NewWriter(buf)
defer gw.Close()
tw := tar.NewWriter(gw)
defer tw.Close()
// Iterate over files and add them to the tar archive
for _, file := range files {
err := addToArchive(tw, file)
if err != nil {
return err
}
}
return nil
}
func addToArchive(tw *tar.Writer, filename string) error {
// Open the file which will be written into the archive
file, err := os.Open(filename)
if err != nil {
return err
}
defer file.Close()
// Get FileInfo about our file providing file size, mode, etc.
info, err := file.Stat()
if err != nil {
return err
}
// Create a tar Header from the FileInfo data
header, err := tar.FileInfoHeader(info, info.Name())
if err != nil {
return err
}
// Use full path as name (FileInfoHeader only takes the basename)
header.Name = filename
// Write file header to the tar archive
err = tw.WriteHeader(header)
if err != nil {
return err
}
// Copy file content to tar archive
_, err = io.Copy(tw, file)
if err != nil {
return err
}
return nil
}
| 379 |
eks-anywhere-packages | aws | Go | package main
import (
"errors"
"fmt"
"io/ioutil"
"os"
"path/filepath"
)
const (
DefaultTmpFolder = "generated"
objectSeparator string = "---\n"
)
func defaultFileOptions() *FileOptions {
return &FileOptions{os.ModePerm}
}
func PersistentFile(op *FileOptions) {
op.Permissions = os.ModePerm
}
type writer struct {
dir string
}
type FileWriter interface {
Write(fileName string, content []byte, f ...FileOptionsFunc) (path string, err error)
WithDir(dir string) (FileWriter, error)
CleanUp()
Dir() string
}
type FileOptions struct {
Permissions os.FileMode
}
type FileOptionsFunc func(op *FileOptions)
func NewWriter(dir string) (FileWriter, error) {
newFolder := filepath.Join(dir, DefaultTmpFolder)
if _, err := os.Stat(newFolder); errors.Is(err, os.ErrNotExist) {
err := os.MkdirAll(newFolder, os.ModePerm)
if err != nil {
return nil, fmt.Errorf("error creating directory [%s]: %v", dir, err)
}
}
return &writer{dir: dir}, nil
}
func (t *writer) Write(fileName string, content []byte, f ...FileOptionsFunc) (string, error) {
op := defaultFileOptions() // Default file options. -->> temporary file with default permissions
for _, optionFunc := range f {
optionFunc(op)
}
currentDir := t.dir
filePath := filepath.Join(currentDir, fileName)
err := ioutil.WriteFile(filePath, content, op.Permissions)
if err != nil {
return "", fmt.Errorf("error writing to file [%s]: %v", filePath, err)
}
return filePath, nil
}
func (w *writer) WithDir(dir string) (FileWriter, error) {
return NewWriter(filepath.Join(w.dir, dir))
}
func (t *writer) Dir() string {
return t.dir
}
func (t *writer) CleanUp() {
_, err := os.Stat(t.dir)
if err == nil {
_ = os.RemoveAll(t.dir)
}
}
func ConcatYamlResources(resources ...[]byte) []byte {
separator := []byte(objectSeparator)
size := 0
for _, resource := range resources {
size += len(resource) + len(separator)
}
b := make([]byte, 0, size)
b = append(b, separator...)
for _, resource := range resources {
b = append(b, resource...)
}
return b
}
| 96 |
eks-anywhere-packages | aws | Go | package main
import (
"fmt"
"io/ioutil"
"os"
"path/filepath"
"strings"
"github.com/go-logr/logr"
"github.com/pkg/errors"
"helm.sh/helm/v3/pkg/action"
"helm.sh/helm/v3/pkg/chartutil"
"helm.sh/helm/v3/pkg/cli"
"helm.sh/helm/v3/pkg/registry"
"sigs.k8s.io/yaml"
)
// helmDriver implements PackageDriver to install packages from Helm charts.
type helmDriver struct {
cfg *action.Configuration
log logr.Logger
settings *cli.EnvSettings
}
func NewHelm(log logr.Logger, authfile string) (*helmDriver, error) {
settings := cli.New()
options := registry.ClientOptCredentialsFile(authfile)
client, err := registry.NewClient(options)
if err != nil {
return nil, fmt.Errorf("creating registry client while initializing helm driver: %w", err)
}
cfg := &action.Configuration{RegistryClient: client}
err = cfg.Init(settings.RESTClientGetter(), settings.Namespace(),
os.Getenv("HELM_DRIVER"), helmLog(log))
if err != nil {
return nil, fmt.Errorf("initializing helm driver: %w", err)
}
return &helmDriver{
cfg: cfg,
log: log,
settings: settings,
}, nil
}
// PullHelmChart will take in a a remote Helm URI and attempt to pull down the chart if it exists.
func (d *helmDriver) PullHelmChart(name, version string) (string, error) {
if name == "" || version == "" {
return "", fmt.Errorf("empty input for PullHelmChart, check flags")
}
install := action.NewInstall(d.cfg)
install.ChartPathOptions.Version = version
if !strings.HasPrefix(name, "oci://") {
name = fmt.Sprintf("oci://%s", name)
}
chartPath, err := install.LocateChart(name, d.settings)
if err != nil || chartPath == "" {
return "", fmt.Errorf("running the Helm LocateChart command, you might need run an AWS ECR Login: %w", err)
}
return chartPath, nil
}
// helmLog wraps logr.Logger to make it compatible with helm's DebugLog.
func helmLog(log logr.Logger) action.DebugLog {
return func(template string, args ...interface{}) {
log.Info(fmt.Sprintf(template, args...))
}
}
// UnTarHelmChart will attempt to move the helm chart out of the helm cache, by untaring it to the pwd and creating the filesystem to unpack it into.
func UnTarHelmChart(chartRef, chartPath, dest string) error {
if chartRef == "" || chartPath == "" || dest == "" {
return fmt.Errorf("Empty input value given for UnTarHelmChart")
}
_, err := os.Stat(dest)
if os.IsNotExist(err) {
if _, err := os.Stat(chartPath); err != nil {
if err := os.MkdirAll(chartPath, 0755); err != nil {
return errors.Wrap(err, "failed to untar (mkdir)")
}
} else {
return errors.Errorf("failed to untar: a file or directory with the name %s already exists", dest)
}
} else {
if err != nil { // Checks directory check errors such as permission issues to read
return errors.Errorf("failed UnTarHelmChart: %s", err)
}
}
// Untar the files, and create the directory structure
return chartutil.ExpandFile(dest, chartRef)
}
// hasRequires checks for the existance of the requires.yaml within the helm directory
func hasRequires(helmdir string) (string, error) {
requires := filepath.Join(helmdir, "requires.yaml")
info, err := os.Stat(requires)
if os.IsNotExist(err) {
return "", err
}
if info.IsDir() {
return "", fmt.Errorf("Found Dir, not requires.yaml file")
}
return requires, nil
}
// validateHelmRequires runs the parse file into struct function, and validations
func validateHelmRequires(fileName string) (*Requires, error) {
helmrequires := &Requires{}
err := parseHelmRequires(fileName, helmrequires)
if err != nil {
return nil, err
}
err = validateHelmRequiresContent(helmrequires)
if err != nil {
return nil, err
}
return helmrequires, err
}
// validateHelmRequiresContent loops over the validation tests
func validateHelmRequiresContent(helmrequires *Requires) error {
for _, v := range helmRequiresValidations {
if err := v(helmrequires); err != nil {
return err
}
}
return nil
}
var helmRequiresValidations = []func(*Requires) error{
validateHelmRequiresName,
}
func validateHelmRequiresName(helmrequires *Requires) error {
err := helmrequires.validateHelmRequiresNotEmpty()
if err != nil {
return err
}
return nil
}
// validateHelmRequiresNotEmpty checks that it has at least one image in the spec
func (helmrequires *Requires) validateHelmRequiresNotEmpty() error {
// Check if Projects are listed
if len(helmrequires.Spec.Images) < 1 {
return fmt.Errorf("Should use non-empty list of images for requires")
}
return nil
}
// parseHelmRequires will attempt to unpack the requires.yaml into the Go struct `Requires`
func parseHelmRequires(fileName string, helmrequires *Requires) error {
content, err := ioutil.ReadFile(fileName)
if err != nil {
return fmt.Errorf("unable to read file due to: %v", err)
}
for _, c := range strings.Split(string(content), YamlSeparator) {
if err = yaml.Unmarshal([]byte(c), helmrequires); err != nil {
return fmt.Errorf("unable to parse %s\nyaml: %s\n %v", fileName, string(c), err)
}
err = yaml.UnmarshalStrict([]byte(c), helmrequires)
if err != nil {
return fmt.Errorf("unable to UnmarshalStrict %s\nyaml: %s\n %v", helmrequires, string(c), err)
}
return nil
}
return fmt.Errorf("cluster spec file %s is invalid or does not contain kind %v", fileName, helmrequires)
}
| 169 |
eks-anywhere-packages | aws | Go | package main
import (
"bytes"
"fmt"
"io/ioutil"
"os"
"path/filepath"
"strings"
"sigs.k8s.io/yaml"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
const (
YamlSeparator = "\n---\n"
)
func ValidateInputConfig(fileName string) (*Input, error) {
inputconfig := &Input{}
err := ParseInputConfig(fileName, inputconfig)
if err != nil {
return nil, err
}
err = ValidateInputConfigContent(inputconfig)
if err != nil {
return nil, err
}
return inputconfig, err
}
func ValidateInputConfigContent(inputConfig *Input) error {
for _, v := range inputConfigValidations {
if err := v(inputConfig); err != nil {
return err
}
}
return nil
}
var inputConfigValidations = []func(*Input) error{
validateInputConfigName,
}
func validateInputConfigName(inputConfig *Input) error {
err := inputConfig.ValidateInputNotEmpty()
if err != nil {
return err
}
return nil
}
func (inputConfig *Input) ValidateInputNotEmpty() error {
// Check if Projects are listed
if len(inputConfig.Packages) < 1 {
return fmt.Errorf("Should use non-empty list of projects for input")
}
return nil
}
func ValidateBundle(fileName string) (*api.PackageBundle, error) {
bundle, err := ParseBundle(fileName)
if err != nil {
return nil, err
}
err = ValidateBundleContent(bundle)
if err != nil {
return nil, err
}
return bundle, err
}
func ValidateBundleContent(bundle *api.PackageBundle) error {
for _, v := range bundleValidations {
if err := v(bundle); err != nil {
return err
}
}
return nil
}
var bundleValidations = []func(*api.PackageBundle) error{
validateBundleName,
}
func validateBundleName(bundle *api.PackageBundle) error {
err := ValidateBundleNoSignature(bundle)
if err != nil {
return err
}
return nil
}
func ValidateBundleNoSignature(bundle *api.PackageBundle) error {
// Check if Projects are listed
if len(bundle.Spec.Packages) < 1 {
return fmt.Errorf("Should use non-empty list of projects for input")
}
return nil
}
func ParseBundle(filename string) (*api.PackageBundle, error) {
content, err := ioutil.ReadFile(filepath.Clean(filename))
if err != nil {
return nil, fmt.Errorf("reading package bundle file %q: %w", filename, err)
}
for _, doc := range bytes.Split(content, []byte(YamlSeparator)) {
bundle := &api.PackageBundle{}
err = yaml.UnmarshalStrict(doc, bundle)
if err != nil {
return nil, fmt.Errorf("unmarshaling package bundle from %q: %w",
filename, err)
}
return bundle, nil
}
return nil, fmt.Errorf("invalid package bundle file %q", filename)
}
func ParseInputConfig(fileName string, inputConfig *Input) error {
content, err := ioutil.ReadFile(filepath.Clean(fileName))
if err != nil {
return fmt.Errorf("unable to read file due to: %v", err)
}
for _, c := range strings.Split(string(content), YamlSeparator) {
if err = yaml.Unmarshal([]byte(c), inputConfig); err != nil {
return fmt.Errorf("unable to parse %s\nyaml: %s\n %v", fileName, string(c), err)
}
err = yaml.UnmarshalStrict([]byte(c), inputConfig)
if err != nil {
return fmt.Errorf("unable to UnmarshalStrict %s\nyaml: %s\n %v", fileName, string(c), err)
}
return nil
}
return fmt.Errorf("cluster spec file %s is invalid or does not contain kind %v", fileName, inputConfig)
}
func (c *SDKClients) NewBundleFromInput(Input *Input) (api.PackageBundleSpec, string, map[string]bool, error) {
packageBundleSpec := api.PackageBundleSpec{}
if Input.Name == "" || Input.KubernetesVersion == "" {
return packageBundleSpec, "", nil, fmt.Errorf("error: Empty input field from `Name` or `KubernetesVersion`.")
}
var name string
name, ok := os.LookupEnv("CODEBUILD_BUILD_NUMBER")
if !ok {
name = Input.Name
} else {
version := strings.Split(Input.KubernetesVersion, ".")
name = fmt.Sprintf("v1-%s-%s", version[1], name)
}
if Input.MinVersion != "" {
packageBundleSpec.MinVersion = Input.MinVersion
}
copyImages := map[string]bool{}
for _, org := range Input.Packages {
for _, project := range org.Projects {
copyImages[project.Repository] = project.CopyImages
bundlePkg, err := c.NewPackageFromInput(project)
if err != nil {
BundleLog.Error(err, "Unable to complete NewBundleFromInput from ecr lookup failure")
return packageBundleSpec, "", nil, err
}
packageBundleSpec.Packages = append(packageBundleSpec.Packages, *bundlePkg)
}
}
return packageBundleSpec, name, copyImages, nil
}
| 170 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"fmt"
"io"
"os"
"path/filepath"
"strings"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/service/cloudwatch"
cloudwatchtypes "github.com/aws/aws-sdk-go-v2/service/cloudwatch/types"
"github.com/aws/aws-sdk-go-v2/service/ecr"
"github.com/aws/aws-sdk-go-v2/service/ecrpublic"
ctrl "sigs.k8s.io/controller-runtime"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
sig "github.com/aws/eks-anywhere-packages/pkg/signature"
)
var BundleLog = ctrl.Log.WithName("BundleGenerator")
func main() {
opts := NewOptions()
opts.SetupLogger()
if opts.generateSample {
outputFilename := filepath.Join(opts.outputFolder, "bundle.yaml")
f, err := os.OpenFile(outputFilename, os.O_WRONLY|os.O_CREATE, 0644)
if err != nil {
BundleLog.Error(err, fmt.Sprintf("opening output file %q", outputFilename))
os.Exit(1)
}
defer f.Close()
err = cmdGenerateSample(f)
if err != nil {
BundleLog.Error(err, "generating sample bundle")
os.Exit(1)
}
fmt.Printf("sample bundle file written to %q\n", outputFilename)
return
}
if opts.promote != "" {
err := cmdPromote(opts)
if err != nil {
BundleLog.Error(err, "promoting curated package")
os.Exit(1)
}
return
}
if opts.regionCheck {
err := cmdRegion(opts)
if err != nil {
BundleLog.Error(err, "checking bundle across region")
os.Exit(1)
}
return
}
err := cmdGenerate(opts)
if err != nil {
BundleLog.Error(err, "generating bundle")
os.Exit(1)
}
}
// cmdGenerateSample writes a sample bundle file to the given output folder.
func cmdGenerateSample(w io.Writer) error {
sample := NewBundleGenerate("generatesample")
_, yml, err := sig.GetDigest(sample, sig.EksaDomain)
if err != nil {
return fmt.Errorf("generating bundle digest: %w", err)
}
_, err = w.Write(yml)
if err != nil {
return fmt.Errorf("writing sample bundle data: %w", err)
}
return nil
}
func cmdPromote(opts *Options) error {
BundleLog.Info("Starting Promote from private ECR to Public ECR....")
promoteCharts := make(map[string][]string)
if opts.tag == "" {
opts.tag = "latest"
}
// If we are promoting an individual chart with the --promote flag like we do for most charts.
if opts.promote != "" {
promoteCharts[opts.promote] = append(promoteCharts[opts.promote], opts.tag)
}
// If we are promoting multiple chart with the --input file flag we override the struct with files inputs from the file.
if opts.inputFile != "" {
packages, err := opts.ValidateInput()
if err != nil {
return err
}
for _, f := range packages {
Inputs, err := ValidateInputConfig(f)
if err != nil {
BundleLog.Error(err, "Unable to validate input file")
os.Exit(1)
}
delete(promoteCharts, opts.promote) // Clear the promote map to pull values only from file
for _, p := range Inputs.Packages {
for _, project := range p.Projects {
promoteCharts[project.Repository] = append(promoteCharts[project.Repository], project.Versions[0].Name)
}
}
}
}
clients, err := GetSDKClients()
if err != nil {
return fmt.Errorf("getting SDK clients: %w", err)
}
clients.ecrPublicClient.SourceRegistry, err = clients.ecrPublicClient.GetRegistryURI()
if err != nil {
return fmt.Errorf("getting registry URI: %w", err)
}
dockerStruct := &DockerAuth{
Auths: map[string]DockerAuthRegistry{
fmt.Sprintf("%s.dkr.ecr.%s.amazonaws.com", clients.stsClient.AccountID, ecrRegion): {clients.ecrClient.AuthConfig},
"public.ecr.aws": {clients.ecrPublicClient.AuthConfig},
},
}
dockerAuth, err := NewAuthFile(dockerStruct)
if err != nil {
return fmt.Errorf("creating auth file: %w", err)
}
if dockerAuth.Authfile == "" {
return fmt.Errorf("no authfile generated")
}
clients.helmDriver, err = NewHelm(BundleLog, dockerAuth.Authfile)
if err != nil {
BundleLog.Error(err, "Unable to create Helm driver")
os.Exit(1)
}
for repoName, versions := range promoteCharts {
for _, version := range versions {
err = clients.PromoteHelmChart(repoName, dockerAuth.Authfile, version, opts.copyImages)
if err != nil {
return fmt.Errorf("promoting Helm chart: %w", err)
}
}
}
err = dockerAuth.Remove()
if err != nil {
return fmt.Errorf("cleaning up docker auth file: %w", err)
}
BundleLog.Info("Promote Finished, exiting gracefully")
return nil
}
func cmdRegion(opts *Options) error {
BundleLog.Info("Starting Region Check Process")
if opts.bundleFile == "" {
BundleLog.Info("Please use the --bundle flag when running region check")
os.Exit(1)
}
Bundle, err := ValidateBundle(opts.bundleFile)
if err != nil {
BundleLog.Error(err, "Unable to validate input file")
os.Exit(1)
}
d := &RepositoryCloudWatch{}
k8sVersionSlice := strings.Split(Bundle.ObjectMeta.Name, "-")
K8sVersion := fmt.Sprintf("%s-%s", k8sVersionSlice[0], k8sVersionSlice[1])
cloudWatchDataStruct := []RepositoryCloudWatch{}
BundleLog.Info("Getting list of images to Region Check")
for _, packages := range Bundle.Spec.Packages {
for _, versions := range packages.Source.Versions {
for _, images := range versions.Images {
d = &RepositoryCloudWatch{
Repository: images.Repository,
Digest: images.Digest,
TotalHits: 0,
K8sVersion: K8sVersion,
}
cloudWatchDataStruct = append(cloudWatchDataStruct, *d)
}
}
}
// Deduplicate the Array of structs for the CRDs packages which contain the same image reference twice.
m := map[RepositoryCloudWatch]struct{}{}
uniquecloudWatchDataStruct := []RepositoryCloudWatch{}
for _, d := range cloudWatchDataStruct {
if _, ok := m[d]; !ok {
uniquecloudWatchDataStruct = append(uniquecloudWatchDataStruct, d)
m[d] = struct{}{}
}
}
// Creating AWS Clients with profile
Profile := "default"
val, ok := os.LookupEnv("AWS_PROFILE")
if ok {
Profile = val
}
BundleLog.Info("Using Env", "AWS_PROFILE", Profile)
BundleLog.Info("Creating SDK connections to Region Check")
clients := &SDKClients{}
conf, err := config.LoadDefaultConfig(context.TODO(),
config.WithRegion(ecrRegion),
config.WithSharedConfigProfile(Profile),
)
if err != nil {
return fmt.Errorf("loading default AWS config: %w", err)
}
cloudwatchC := cloudwatch.NewFromConfig(conf)
clients, err = clients.GetProfileSDKConnection("ecr", Profile, ecrRegion)
if err != nil {
BundleLog.Error(err, "getting SDK connection")
os.Exit(1)
}
clients, err = clients.GetProfileSDKConnection("sts", Profile, ecrRegion)
if err != nil {
BundleLog.Error(err, "getting profile SDK connection")
os.Exit(1)
}
var cloudwatchData []cloudwatchtypes.MetricDatum
var missingList []string
for _, region := range RegionList {
BundleLog.Info("Starting Check for", "Region", region)
clients, err = clients.GetProfileSDKConnection("ecr", Profile, region)
if err != nil {
BundleLog.Error(err, "getting ECR SDK connection")
os.Exit(1)
}
for i, image := range uniquecloudWatchDataStruct {
check, err := clients.ecrClientRelease.shaExistsInRepository(image.Repository, image.Digest)
if err != nil {
BundleLog.Error(err, "finding ECR images")
}
if check {
uniquecloudWatchDataStruct[i].TotalHits++
} else {
missingList = append(missingList, fmt.Sprintf("%s.dkr.ecr.%s.amazonaws.com/%s:%s", clients.stsClientRelease.AccountID, region, image.Repository, image.Digest))
}
}
}
BundleLog.Info("Missing Region List:")
printSlice(missingList)
for i, image := range uniquecloudWatchDataStruct {
percent := (float64(image.TotalHits) / float64(len(RegionList))) * 100
uniquecloudWatchDataStruct[i].Percent = percent
cloudwatchData = FormCloudWatchData(cloudwatchData, image.Repository, uniquecloudWatchDataStruct[i].Percent)
}
err = PushCloudWatchRegionCheckData(cloudwatchC, cloudwatchData, uniquecloudWatchDataStruct[0].K8sVersion)
if err != nil {
BundleLog.Error(err, "pushing cloudwatch data")
os.Exit(1)
}
BundleLog.Info("Finished Region Check!")
return nil
}
func cmdGenerate(opts *Options) error {
// grab local path to caller, and make new caller
pwd, err := os.Getwd()
if err != nil {
BundleLog.Error(err, "Unable to get current working directory")
os.Exit(1)
}
// validate that an input flag is either given, or the system can find yaml files to use.
files, err := opts.ValidateInput()
if err != nil {
return err
}
// Validate Input config, and turn into Input struct
BundleLog.Info("Using input file to create bundle crds.", "Input file", opts.inputFile)
conf, err := config.LoadDefaultConfig(context.TODO(), config.WithRegion(ecrPublicRegion))
if err != nil {
BundleLog.Error(err, "loading default AWS config: %w", err)
os.Exit(1)
}
clients := &SDKClients{}
client := ecrpublic.NewFromConfig(conf)
clients.ecrPublicClient, err = NewECRPublicClient(client, true)
if err != nil {
BundleLog.Error(err, "creating public ECR client")
os.Exit(1)
}
conf, err = config.LoadDefaultConfig(context.TODO(), config.WithRegion(ecrRegion))
if err != nil {
BundleLog.Error(err, "loading default AWS config: %w", err)
os.Exit(1)
}
ecrClient := ecr.NewFromConfig(conf)
clients.ecrClient, err = NewECRClient(ecrClient, true)
if err != nil {
BundleLog.Error(err, "creating ECR client")
os.Exit(1)
}
// Creating AWS Clients with profile
Profile := "default"
val, ok := os.LookupEnv("AWS_PROFILE")
if ok {
Profile = val
}
BundleLog.Info("Using Env", "AWS_PROFILE", Profile)
clients, err = clients.GetProfileSDKConnection("sts", Profile, ecrRegion)
if err != nil {
BundleLog.Error(err, "getting profile SDK connection")
os.Exit(1)
}
for _, f := range files {
Inputs, err := ValidateInputConfig(f)
if err != nil {
BundleLog.Error(err, "Unable to validate input file")
os.Exit(1)
}
// Create Authfile for Helm Driver
dockerReleaseStruct := &DockerAuth{
Auths: map[string]DockerAuthRegistry{
fmt.Sprintf("public.ecr.aws/%s", clients.ecrPublicClient.SourceRegistry): {clients.ecrPublicClient.AuthConfig},
},
}
dockerAuth, err := NewAuthFile(dockerReleaseStruct)
if err != nil || dockerAuth.Authfile == "" {
BundleLog.Error(err, "Unable create AuthFile")
os.Exit(1)
}
driver, err := NewHelm(BundleLog, dockerAuth.Authfile)
if err != nil {
BundleLog.Error(err, "Unable to create Helm driver")
os.Exit(1)
}
BundleLog.Info("In Progress: Populating Bundles and looking up Sha256 tags")
addOnBundleSpec, name, copyImages, err := clients.NewBundleFromInput(Inputs)
if err != nil {
BundleLog.Error(err, "Unable to create bundle from input file")
os.Exit(1)
}
// Pull Helm charts for all the populated helm fields of the bundles.
for i, charts := range addOnBundleSpec.Packages {
fullURI := fmt.Sprintf("%s/%s", charts.Source.Registry, charts.Source.Repository)
chartPath, err := driver.PullHelmChart(fullURI, charts.Source.Versions[0].Name)
if err != nil {
BundleLog.Error(err, "Unable to pull Helm Chart")
os.Exit(1)
}
chartName, helmname, err := splitECRName(fullURI)
if err != nil {
BundleLog.Error(err, "Unable to split helm name, invalid format")
os.Exit(1)
}
dest := filepath.Join(pwd, chartName)
err = UnTarHelmChart(chartPath, chartName, dest)
if err != nil {
BundleLog.Error(err, "Unable to untar Helm Chart")
os.Exit(1)
}
// Check for requires.yaml in the unpacked helm chart
helmDest := filepath.Join(pwd, chartName, helmname)
defer os.RemoveAll(helmDest)
f, err := hasRequires(helmDest)
if err != nil {
BundleLog.Error(err, "Helm chart doesn't have requires.yaml inside")
os.Exit(1)
}
// Unpack requires.yaml into a GO struct
helmRequires, err := validateHelmRequires(f)
if err != nil {
BundleLog.Error(err, "Unable to parse requires.yaml file to Go Struct")
os.Exit(1)
}
// Populate Images to bundle spec from Requires.yaml
helmImage := []api.VersionImages{}
for _, image := range helmRequires.Spec.Images {
helmImage = append(helmImage, api.VersionImages{
Repository: image.Repository,
Digest: image.Digest,
})
}
charts.Source.Versions[0].Images = helmImage
// Populate Configurations to bundle spec from Requires.yaml
if len(deleteEmptyStringSlice(helmRequires.Spec.Dependencies)) > 0 {
charts.Source.Versions[0].Dependencies = helmRequires.Spec.Dependencies
}
charts.Source.Versions[0].Schema = helmRequires.Spec.Schema
// Set the registry to empty string since we pull it from the PackageBundleController instead now.
addOnBundleSpec.Packages[i].Source.Registry = ""
}
err = dockerAuth.Remove()
if err != nil {
BundleLog.Error(err, "unable to remove docker auth file")
os.Exit(1)
}
bundle := AddMetadata(addOnBundleSpec, name)
// We will make a compound check for public and private profile after the launch once we want to stop
// push packages to private ECR.
if opts.publicProfile != "" {
BundleLog.Info("Starting release public ECR process....")
clients, err := GetSDKClients()
if err != nil {
BundleLog.Error(err, "getting sdk clients")
os.Exit(1)
}
clients, err = clients.GetProfileSDKConnection("ecrpublic", opts.publicProfile, ecrPublicRegion)
if err != nil {
BundleLog.Error(err, "Unable create SDK Client connections")
os.Exit(1)
}
clients.ecrPublicClient.SourceRegistry, err = clients.ecrPublicClient.GetRegistryURI()
if err != nil {
BundleLog.Error(err, "Unable create find Public ECR URI from calling account")
os.Exit(1)
}
clients.ecrPublicClientRelease.SourceRegistry, err = clients.ecrPublicClientRelease.GetRegistryURI()
if err != nil {
BundleLog.Error(err, "Unable create find Public ECR URI for destination account")
os.Exit(1)
}
dockerReleaseStruct = &DockerAuth{
Auths: map[string]DockerAuthRegistry{
fmt.Sprintf("%s.dkr.ecr.%s.amazonaws.com", clients.stsClient.AccountID, ecrRegion): {
clients.ecrClient.AuthConfig,
},
fmt.Sprintf("public.ecr.aws/%s", clients.ecrPublicClient.SourceRegistry): {
clients.ecrPublicClient.AuthConfig,
},
"public.ecr.aws": {clients.ecrPublicClientRelease.AuthConfig},
},
}
dockerAuth, err = NewAuthFile(dockerReleaseStruct)
if err != nil || dockerAuth.Authfile == "" {
BundleLog.Error(err, "Unable create AuthFile")
os.Exit(1)
}
clients.helmDriver, err = NewHelm(BundleLog, dockerAuth.Authfile)
if err != nil {
BundleLog.Error(err, "Unable to create Helm driver")
os.Exit(1)
}
for _, charts := range addOnBundleSpec.Packages {
for _, versions := range charts.Source.Versions {
err = clients.PromoteHelmChart(charts.Source.Repository, dockerAuth.Authfile, versions.Name, copyImages[charts.Source.Repository])
if err != nil {
BundleLog.Error(err, "promoting helm chart",
"name", charts.Source.Repository)
os.Exit(1)
}
}
}
err = dockerAuth.Remove()
if err != nil {
BundleLog.Error(err, "removing docker auth file")
os.Exit(1)
}
return nil
}
// See above comment about compound check when we want to cutover
// if o.publicProfile != "" && if o.privateProfile != "" {}
if opts.privateProfile != "" {
BundleLog.Info("Starting release to private ECR process....")
clients, err := GetSDKClients()
if err != nil {
BundleLog.Error(err, "getting SDK clients")
os.Exit(1)
}
clients, err = clients.GetProfileSDKConnection("ecr", opts.privateProfile, ecrRegion)
if err != nil {
BundleLog.Error(err, "getting SDK connection")
os.Exit(1)
}
clients, err = clients.GetProfileSDKConnection("sts", opts.privateProfile, ecrRegion)
if err != nil {
BundleLog.Error(err, "getting profile SDK connection")
os.Exit(1)
}
dockerReleaseStruct = &DockerAuth{
Auths: map[string]DockerAuthRegistry{
fmt.Sprintf("%s.dkr.ecr.%s.amazonaws.com", clients.stsClient.AccountID, ecrRegion): {
clients.ecrClient.AuthConfig,
},
fmt.Sprintf("%s.dkr.ecr.%s.amazonaws.com", clients.stsClientRelease.AccountID, ecrRegion): {
clients.ecrClientRelease.AuthConfig,
},
},
}
dockerAuth, err = NewAuthFile(dockerReleaseStruct)
if err != nil {
BundleLog.Error(err, "Unable create AuthFile")
os.Exit(1)
}
clients.helmDriver, err = NewHelm(BundleLog, dockerAuth.Authfile)
if err != nil {
BundleLog.Error(err, "Unable to create Helm driver")
os.Exit(1)
}
for _, charts := range addOnBundleSpec.Packages {
for _, versions := range charts.Source.Versions {
err = clients.PromoteHelmChart(charts.Source.Repository, dockerAuth.Authfile, versions.Name, true)
if err != nil {
BundleLog.Error(err, "promoting helm chart",
"name", charts.Source.Repository)
os.Exit(1)
}
}
}
err = dockerAuth.Remove()
if err != nil {
BundleLog.Error(err, "removing docker auth file")
os.Exit(1)
}
return nil
}
bundle.Annotations[FullExcludesAnnotation] = Excludes
signature, err := GetBundleSignature(context.Background(), bundle, opts.key)
if err != nil {
BundleLog.Error(err, "Unable to sign bundle with kms key")
os.Exit(1)
}
bundle.Annotations[FullSignatureAnnotation] = signature
yml, err := serializeBundle(bundle)
if err != nil {
BundleLog.Error(err, "marshaling bundle YAML: %w", err)
os.Exit(1)
}
BundleLog.Info("In Progress: Writing bundle to output")
outputDir := filepath.Join(pwd, opts.outputFolder)
outputPath, err := NewWriter(outputDir)
if err != nil {
BundleLog.Error(err, "Unable to create new Writer")
os.Exit(1)
}
if _, err := outputPath.Write("bundle.yaml", yml, PersistentFile); err != nil {
BundleLog.Error(err, "Unable to write Bundle to yaml")
os.Exit(1)
}
BundleLog.Info("Finished writing output crd files.", "Output path", fmt.Sprintf("%s%s", opts.outputFolder, "/"))
}
return nil
}
| 571 |
eks-anywhere-packages | aws | Go | package main
import (
"flag"
"fmt"
"os"
"path/filepath"
"strings"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/log/zap"
)
// Options represents the flag for the current plugin
type Options struct {
inputFile string
outputFolder string
generateSample bool
promote string
tag string
copyImages bool
key string
publicProfile string
privateProfile string
bundleFile string
regionCheck bool
}
func (o *Options) SetupLogger() {
opts := zap.Options{}
opts.BindFlags(flag.CommandLine)
ctrl.SetLogger(zap.New(zap.UseFlagOptions(&opts)))
}
// Validate validates the receiving options.
func (o *Options) ValidateInput() ([]string, error) {
f := []string{}
if o.inputFile != "" {
f = append(f, o.inputFile)
return f, nil
}
f, err := getYamlFiles()
if err != nil {
BundleLog.Error(err, "Error getting yaml files from stdin")
return nil, err
}
return f, nil
}
func getYamlFiles() ([]string, error) {
f := []string{}
pwd, _ := os.Getwd()
err := filepath.Walk(pwd, func(path string, info os.FileInfo, err error) error {
if err != nil {
fmt.Println(err)
return err
}
endsWith := strings.HasSuffix(path, ".yaml")
if endsWith {
notoutput := strings.Contains(path, "output/")
if !notoutput {
f = append(f, path)
}
}
return nil
})
if err != nil {
fmt.Println(err)
return nil, err
}
return f, err
}
// NewOptions instantiates Options from arguments
func NewOptions() *Options {
o := Options{}
fs := flag.NewFlagSet(os.Args[0], flag.ExitOnError)
fs.BoolVar(&o.generateSample, "generate-sample", false, "Whether you want to generate a sample bundle for yourself")
fs.StringVar(&o.inputFile, "input", "", "The path where the input bundle generation file lives")
fs.StringVar(&o.outputFolder, "output", "output", "The path where to write the output bundle files")
fs.StringVar(&o.promote, "promote", "", "The Helm chart private ECR OCI uri to pull and promote")
fs.StringVar(&o.tag, "tag", "", "The tag of the helm chart used with promote flag")
fs.BoolVar(&o.copyImages, "copy-images", false, "Whether to copy images during a helm promotion, the default is to Not copy.")
fs.StringVar(&o.key, "key", "k", "The key to sign with")
fs.StringVar(&o.publicProfile, "public-profile", "", "The AWS Public Profile to release the prod bundle into")
fs.StringVar(&o.privateProfile, "private-profile", "", "The AWS Private Profile to release all packages into")
fs.StringVar(&o.bundleFile, "bundle", "", "The path where the bundle file lives")
fs.BoolVar(&o.regionCheck, "region-check", false, "Check the passed in bundle resource and if they exist in the supported ECR regions")
err := fs.Parse(os.Args[1:])
if err != nil {
BundleLog.Error(err, "Error parsing input flags")
}
return &o
}
| 95 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"fmt"
"os"
"path/filepath"
"strings"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/service/ecr"
"github.com/aws/aws-sdk-go-v2/service/ecrpublic"
"github.com/aws/aws-sdk-go-v2/service/sts"
)
type SDKClients struct {
ecrClient *ecrClient
ecrPublicClient *ecrPublicClient
stsClient *stsClient
ecrClientRelease *ecrClient
ecrPublicClientRelease *ecrPublicClient
stsClientRelease *stsClient
helmDriver *helmDriver
}
// GetSDKClients is used to handle the creation of different SDK clients.
func GetSDKClients() (*SDKClients, error) {
clients := &SDKClients{}
var err error
// ECR Public Connection with us-east-1 region
conf, err := config.LoadDefaultConfig(context.TODO(), config.WithRegion(ecrPublicRegion))
if err != nil {
return nil, fmt.Errorf("loading default AWS config: %w", err)
}
client := ecrpublic.NewFromConfig(conf)
clients.ecrPublicClient, err = NewECRPublicClient(client, true)
if err != nil {
return nil, fmt.Errorf("creating default public ECR client: %w", err)
}
// STS Connection with us-west-2 region
conf, err = config.LoadDefaultConfig(context.TODO(), config.WithRegion(ecrRegion))
if err != nil {
return nil, fmt.Errorf("loading default AWS config: %w", err)
}
stsclient := sts.NewFromConfig(conf)
clients.stsClient, err = NewStsClient(stsclient, true)
if err != nil {
return nil, fmt.Errorf("Unable to create SDK connection to STS %s", err)
}
// ECR Private Connection with us-west-2 region
conf, err = config.LoadDefaultConfig(context.TODO(), config.WithRegion(ecrRegion))
if err != nil {
return nil, fmt.Errorf("loading default AWS config: %w", err)
}
ecrClient := ecr.NewFromConfig(conf)
clients.ecrClient, err = NewECRClient(ecrClient, true)
if err != nil {
return nil, fmt.Errorf("Unable to create SDK connection to ECR %s", err)
}
return clients, nil
}
func (c *SDKClients) GetProfileSDKConnection(service, profile, region string) (*SDKClients, error) {
if service == "" || profile == "" {
return nil, fmt.Errorf("empty service, or profile passed to GetProfileSDKConnection")
}
confWithProfile, err := config.LoadDefaultConfig(context.TODO(),
config.WithRegion(region),
config.WithSharedConfigProfile(profile))
if err != nil {
return nil, fmt.Errorf("creating public AWS client config: %w", err)
}
switch service {
case "ecrpublic":
clientWithProfile := ecrpublic.NewFromConfig(confWithProfile)
c.ecrPublicClientRelease, err = NewECRPublicClient(clientWithProfile, true)
if err != nil {
return nil, fmt.Errorf("Unable to create SDK connection to ECR Public using another profile %s", err)
}
return c, nil
case "ecr":
clientWithProfile := ecr.NewFromConfig(confWithProfile)
c.ecrClientRelease, err = NewECRClient(clientWithProfile, true)
if err != nil {
return nil, fmt.Errorf("Unable to create SDK connection to ECR using another profile %s", err)
}
return c, nil
case "sts":
clientWithProfile := sts.NewFromConfig(confWithProfile)
c.stsClientRelease, err = NewStsClient(clientWithProfile, true)
if err != nil {
return nil, fmt.Errorf("Unable to create SDK connection to STS using another profile %s", err)
}
return c, nil
}
return nil, fmt.Errorf("gave service not supported by GetProfileSDKConnection(), consider adding it to the switch case")
}
// PromoteHelmChart will take a given repository, and authFile and handle helm and image promotion for the mentioned chart.
func (c *SDKClients) PromoteHelmChart(repository, authFile, tag string, copyImages bool) error {
var name, version, sha string
pwd, err := os.Getwd()
if err != nil {
return fmt.Errorf("Error getting pwd %s", err)
}
// If we are not moving artifacts to the Private ECR Packages artifact account, get information from public ECR instead.
// The first scenario runs for flags --private-profile and --promote.
// The 2nd scenario runs for flags and --public-profile.
if c.ecrClientRelease != nil || c.ecrClient != nil {
name, version, sha, err = c.getNameAndVersion(repository, tag, c.stsClient.AccountID)
if err != nil {
return fmt.Errorf("Error getting name and version from helmchart %s", err)
}
}
if c.ecrPublicClientRelease != nil {
name, version, sha, err = c.getNameAndVersionPublic(repository, tag, c.stsClient.AccountID)
if err != nil {
return fmt.Errorf("Error getting name and version from helmchart %s", err)
}
}
// Pull the Helm chart to Helm Cache
BundleLog.Info("Found Helm Chart to read requires.yaml for image information", "Chart", fmt.Sprintf("%s:%s", name, version))
semVer := strings.Replace(version, "_", "+", 1) // TODO use the Semvar library instead of this hack.
chartPath, err := c.helmDriver.PullHelmChart(name, semVer)
if err != nil {
return fmt.Errorf("Error pulling helmchart %s", err)
}
// Get the correct Repo Name from the flag based on ECR repo name formatting
// since we prepend the github org on some repo's, and not on others.
chartName, helmname, err := splitECRName(name)
if err != nil {
return fmt.Errorf("Failed splitECRName %s", err)
}
// Untar the helm .tgz to pwd and name the folder to the helm chart Name
dest := filepath.Join(pwd, chartName)
err = UnTarHelmChart(chartPath, chartName, dest)
if err != nil {
return fmt.Errorf("failed pulling helm release %s", err)
}
// Check for requires.yaml in the unpacked helm chart
helmDest := filepath.Join(pwd, chartName, helmname)
defer os.RemoveAll(helmDest)
f, err := hasRequires(helmDest)
if err != nil {
return fmt.Errorf("Helm chart doesn't have requires.yaml inside %s", err)
}
// Unpack requires.yaml into a GO struct
helmRequiresImages, err := validateHelmRequires(f)
if err != nil {
return fmt.Errorf("Unable to parse requires.yaml file to Go Struct %s", err)
}
// Create a 2nd struct since the the helm chart is going to Public ECR while the images are going to Private ECR.
helmRequires := &Requires{
Spec: RequiresSpec{
Images: []Image{
{
Repository: chartName,
Tag: version,
Digest: sha,
},
},
},
}
// Loop through each image, and the helm chart itself and check for existance in ECR Public, skip if we find the SHA already exists in destination.
// If we don't find the SHA in public, we lookup the tag from Private Dev account, and move to Private Artifact account.
// This runs for flags
// --private-profile
// --promote --copy-images
var destination string
if copyImages {
accountID := c.activeAccountID()
for _, images := range helmRequiresImages.Spec.Images {
checkSha, checkTag, err := c.CheckDestinationECR(images, images.Tag)
// This is going to run a copy if only 1 check passes because there are scenarios where the correct SHA exists, but the tag is not in sync.
// Copy with the correct image SHA, but a new tag will just write a new tag to ECR so it's safe to run.
if checkSha && checkTag {
BundleLog.Info("Digest, and Tag already exists in destination location......skipping", "Destination:", fmt.Sprintf("docker://%s.dkr.ecr.us-west-2.amazonaws.com/%s:%s @ %s", accountID, images.Repository, images.Tag, images.Digest))
continue
} else {
BundleLog.Info("Image Digest, and Tag dont exist in destination location...... copy to", "Location", fmt.Sprintf("%s/%s sha:%s", images.Repository, images.Tag, images.Digest))
// We have cases with tag mismatch where the SHA is accurate, but the tag in the destination repo is not synced, this will sync it.
if images.Tag == "" {
images.Tag, err = c.ecrClient.tagFromSha(images.Repository, images.Digest, tag)
}
if err != nil {
BundleLog.Error(err, "Unable to find Tag from Digest")
}
BundleLog.Info("Moving container images to ECR")
source := fmt.Sprintf("docker://%s.dkr.ecr.us-west-2.amazonaws.com/%s:%s", accountID, images.Repository, images.Tag)
if c.ecrClientRelease != nil {
destination = fmt.Sprintf("docker://%s.dkr.ecr.us-west-2.amazonaws.com/%s:%s", c.stsClientRelease.AccountID, images.Repository, images.Tag)
} else if c.ecrPublicClientRelease != nil {
destination = fmt.Sprintf("docker://%s/%s:%s", c.ecrPublicClientRelease.SourceRegistry, images.Repository, images.Tag)
} else {
destination = fmt.Sprintf("docker://%s/%s:%s", c.ecrPublicClient.SourceRegistry, images.Repository, images.Tag)
}
err := copyImage(BundleLog, authFile, source, destination)
if err != nil {
return fmt.Errorf("Unable to copy image from source to destination repo %s", err)
}
continue
}
}
}
// If we have the profile for the artifact account present, we skip moving helm charts since they go to the public ECR only.
// This will move the Helm chart from Private ECR to Public ECR if it doesn't exist. This goes to either dev or prod depending on the flags passed in.
// This runs for flags --public-profile and --promote.
if c.ecrClientRelease == nil {
for _, images := range helmRequires.Spec.Images {
//Check if the Helm chart is going to Prod, or dev account.
destinationRegistry := c.ecrPublicClient.SourceRegistry
if c.ecrPublicClientRelease != nil {
destinationRegistry = c.ecrPublicClientRelease.SourceRegistry
}
checkSha, checkTag, err := c.CheckDestinationECR(images, images.Tag)
if checkSha && checkTag {
BundleLog.Info("Digest, and Tag already exists in destination location......skipping", "Destination:", fmt.Sprintf("docker://%s/%s:%s @ %s", destinationRegistry, images.Repository, images.Tag, images.Digest))
continue
} else {
if c.ecrPublicClientRelease == nil {
source := fmt.Sprintf("docker://%s.dkr.ecr.us-west-2.amazonaws.com/%s:%s", c.stsClient.AccountID, images.Repository, images.Tag)
destination := fmt.Sprintf("docker://%s/%s:%s", destinationRegistry, images.Repository, images.Tag)
BundleLog.Info("Copying Helm Digest, and Tag to destination location......", "Location", fmt.Sprintf("%s/%s:%s %s", c.ecrPublicClient.SourceRegistry, images.Repository, images.Tag, images.Digest))
err = copyImage(BundleLog, authFile, source, destination)
if err != nil {
return fmt.Errorf("Unable to copy image from source to destination repo %s", err)
}
} else {
source := fmt.Sprintf("docker://%s/%s:%s", c.ecrPublicClient.SourceRegistry, images.Repository, images.Tag)
destination := fmt.Sprintf("docker://%s/%s:%s", destinationRegistry, images.Repository, images.Tag)
BundleLog.Info("Copying Helm Digest, and Tag to destination location......", "Location", fmt.Sprintf("%s/%s:%s %s", c.ecrPublicClient.SourceRegistry, images.Repository, images.Tag, images.Digest))
err = copyImage(BundleLog, authFile, source, destination)
if err != nil {
return fmt.Errorf("Unable to copy image from source to destination repo %s", err)
}
}
}
}
}
return nil
}
func (c *SDKClients) CheckDestinationECR(images Image, version string) (bool, bool, error) {
var checkSha, checkTag bool
var err error
var check CheckECR
// Change the source destination check depending on release to dev or prod.
destination := c.ecrPublicClient
if c.ecrPublicClientRelease != nil {
destination = c.ecrPublicClientRelease
}
// We either check in private ECR or public ECR depending on what's passed in.
if c.stsClientRelease != nil {
check = c.ecrClientRelease
} else {
check = destination
}
checkSha, err = check.shaExistsInRepository(images.Repository, images.Digest)
if err != nil {
return false, false, err
}
checkTag, err = check.tagExistsInRepository(images.Repository, version)
if err != nil {
return false, false, err
}
return checkSha, checkTag, nil
}
func (c *SDKClients) activeAccountID() string {
if c.stsClientRelease != nil && c.stsClient != nil {
return c.stsClient.AccountID
}
if c.stsClientRelease != nil {
return c.stsClientRelease.AccountID
}
if c.stsClient != nil {
return c.stsClient.AccountID
}
return ""
}
| 289 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"fmt"
"github.com/aws/aws-sdk-go-v2/service/cloudwatch"
cloudwatchtypes "github.com/aws/aws-sdk-go-v2/service/cloudwatch/types"
)
var RegionList = []string{
"us-east-2",
"us-east-1",
"us-west-1",
"us-west-2",
"ap-northeast-3",
"ap-northeast-2",
"ap-southeast-1",
"ap-southeast-2",
"ap-northeast-1",
"ca-central-1",
"eu-central-1",
"eu-west-1",
"eu-west-2",
"eu-west-3",
"eu-north-1",
"sa-east-1",
}
type RepositoryCloudWatch struct {
Repository string `json:"repository,omitempty"`
Digest string `json:"digest,omitempty"`
Region string `json:"region,omitempty"`
TotalHits int `json:"totalhits,omitempty"`
Percent float64 `json:"percent,omitempty"`
K8sVersion string `json:"k8sversion,omitempty"`
}
func FormCloudWatchData(metricData []cloudwatchtypes.MetricDatum, name string, value float64) []cloudwatchtypes.MetricDatum {
regionName := "region-availibity"
d := []cloudwatchtypes.Dimension{
{
Name: ®ionName,
Value: &name,
},
}
metricDataPoint := &cloudwatchtypes.MetricDatum{
Dimensions: d,
MetricName: &name,
Value: &value,
}
metricData = append(metricData, *metricDataPoint)
return metricData
}
func PushCloudWatchRegionCheckData(c *cloudwatch.Client, data []cloudwatchtypes.MetricDatum, k8s_version string) error {
Input := &cloudwatch.PutMetricDataInput{
MetricData: data,
Namespace: &k8s_version,
}
err := pushMetricData(c, *Input)
if err != nil {
return err
}
return nil
}
func pushMetricData(c *cloudwatch.Client, input cloudwatch.PutMetricDataInput) error {
_, err := c.PutMetricData(context.TODO(), &input)
if err != nil {
return fmt.Errorf("sending cloudwatch PutMetricData(): %w", err)
}
return nil
}
| 75 |
eks-anywhere-packages | aws | Go | package main
import (
"context"
"fmt"
"github.com/aws/aws-sdk-go-v2/service/sts"
)
type stsClient struct {
stsClientInterface
AccountID string
}
type stsClientInterface interface {
GetCallerIdentity(ctx context.Context, params *sts.GetCallerIdentityInput, optFns ...func(*sts.Options)) (*sts.GetCallerIdentityOutput, error)
}
func NewStsClient(client stsClientInterface, account bool) (*stsClient, error) {
stsClient := &stsClient{stsClientInterface: client}
if account {
stslookup, err := stsClient.GetCallerIdentity(context.TODO(), &sts.GetCallerIdentityInput{})
if err != nil {
return nil, err
}
if *stslookup.Account != "" {
stsClient.AccountID = *stslookup.Account
return stsClient, nil
}
return nil, fmt.Errorf("Empty Account ID from stslookup call")
}
return stsClient, nil
}
| 34 |
eks-anywhere-packages | aws | Go | package artifacts
import "context"
//go:generate mockgen -source puller.go -destination=mocks/puller.go -package=mocks Client
// Puller is an interface to abstract interaction with OCI registries or other
// storage services.
type Puller interface {
// Pull the artifact at the given reference.
Pull(ctx context.Context, ref string, clusterName string) ([]byte, error)
}
| 13 |
eks-anywhere-packages | aws | Go | package artifacts
import (
"context"
"github.com/go-logr/logr"
"oras.land/oras-go/v2/registry/remote"
"github.com/aws/eks-anywhere-packages/pkg/registry"
)
// RegistryPuller handles pulling OCI artifacts from an OCI registry
type RegistryPuller struct {
log logr.Logger
}
var _ Puller = (*RegistryPuller)(nil)
// NewRegistryPuller creates and initializes a RegistryPuller.
func NewRegistryPuller(logger logr.Logger) *RegistryPuller {
return &RegistryPuller{
log: logger,
}
}
func (p *RegistryPuller) Pull(ctx context.Context, ref string, clusterName string) ([]byte, error) {
art, err := registry.ParseArtifactFromURI(ref)
if err != nil {
return nil, err
}
certificates, err := registry.GetClusterCertificate(clusterName)
if err != nil {
p.log.Info("problem getting certificate file", "error", err.Error())
}
var store *registry.DockerCredentialStore
configFile, err := registry.CredentialsConfigLoad()
if err != nil {
p.log.Info("problem getting credential file", "error", err.Error())
} else {
store = registry.NewDockerCredentialStore(configFile)
}
sc := registry.NewStorageContext(art.Registry, store, certificates, false)
remoteRegistry, err := remote.NewRegistry(art.Registry)
if err != nil {
return nil, err
}
client := registry.NewOCIRegistry(sc, remoteRegistry)
return registry.PullBytes(ctx, client, *art)
}
| 54 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: puller.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
gomock "github.com/golang/mock/gomock"
)
// MockPuller is a mock of Puller interface.
type MockPuller struct {
ctrl *gomock.Controller
recorder *MockPullerMockRecorder
}
// MockPullerMockRecorder is the mock recorder for MockPuller.
type MockPullerMockRecorder struct {
mock *MockPuller
}
// NewMockPuller creates a new mock instance.
func NewMockPuller(ctrl *gomock.Controller) *MockPuller {
mock := &MockPuller{ctrl: ctrl}
mock.recorder = &MockPullerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockPuller) EXPECT() *MockPullerMockRecorder {
return m.recorder
}
// Pull mocks base method.
func (m *MockPuller) Pull(ctx context.Context, ref, clusterName string) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Pull", ctx, ref, clusterName)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Pull indicates an expected call of Pull.
func (mr *MockPullerMockRecorder) Pull(ctx, ref, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Pull", reflect.TypeOf((*MockPuller)(nil).Pull), ctx, ref, clusterName)
}
| 51 |
eks-anywhere-packages | aws | Go | package authenticator
import "context"
// DockerAuth Structure for the authentication file
type DockerAuth struct {
Auths map[string]DockerAuthRegistry `json:"auths,omitempty"`
}
type DockerAuthRegistry struct {
Auth string `json:"auth"`
}
//go:generate mockgen -source authenticator.go -destination=mocks/authenticator.go -package=mocks Authenticator
// Authenticator is an interface for creating an authentication file with credentials to private registries
//
// Currently this is used with the Helm Driver which takes credentials in this way
// For this first implementation, kubernetes secrets will be used to pass in a token
type Authenticator interface {
// Initialize Points Authenticator to target cluster
Initialize(clusterName string) error
// AuthFilename Gets Authentication File Path for OCI Registry
AuthFilename() string
// AddToConfigMap Adds Namespace to config map
AddToConfigMap(ctx context.Context, name string, namespace string) error
// DelFromConfigMap Removes Namespace from config map
DelFromConfigMap(ctx context.Context, name string, namespace string) error
// GetSecretValues Retrieves ImagePullSecrets data to pass to helm chart
GetSecretValues(ctx context.Context, namespace string) (map[string]interface{}, error)
// AddSecretToAllNamespace Add Secrets to all namespaces
AddSecretToAllNamespace(ctx context.Context) error
}
| 39 |
eks-anywhere-packages | aws | Go | package authenticator
import (
"context"
"os"
"strconv"
"time"
batchv1 "k8s.io/api/batch/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/csset"
)
const (
ConfigMapName = "ns-secret-map"
ecrTokenName = "ecr-token"
cronJobName = "cron-ecr-renew"
jobExecName = "eksa-auth-refresher-"
mirrorCredName = "registry-mirror-cred"
)
type ecrSecret struct {
clientset kubernetes.Interface
targetCluster string
}
var _ Authenticator = (*ecrSecret)(nil)
func NewECRSecret(config *rest.Config) (*ecrSecret, error) {
clientset, err := kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
return &ecrSecret{
clientset: clientset,
targetCluster: api.PackageNamespace,
}, nil
}
func (s *ecrSecret) AuthFilename() string {
// Check if Helm registry config is set
helmconfig := os.Getenv("HELM_REGISTRY_CONFIG")
if helmconfig != "" {
// Use HELM_REGISTRY_CONFIG
return helmconfig
}
return ""
}
func (s *ecrSecret) Initialize(clusterName string) error {
s.targetCluster = api.PackageNamespace + "-" + clusterName
return nil
}
func (s *ecrSecret) AddToConfigMap(ctx context.Context, name string, namespace string) error {
cm, err := s.clientset.CoreV1().ConfigMaps(s.targetCluster).
Get(ctx, ConfigMapName, metav1.GetOptions{})
if err != nil {
return err
}
css := csset.NewCSSet(cm.Data[namespace])
css.Add(name)
cm.Data[namespace] = css.String()
_, err = s.clientset.CoreV1().ConfigMaps(s.targetCluster).
Update(ctx, cm, metav1.UpdateOptions{})
if err != nil {
return err
}
return nil
}
func (s *ecrSecret) AddSecretToAllNamespace(ctx context.Context) error {
cronjob, err := s.clientset.BatchV1().CronJobs(api.PackageNamespace).Get(ctx, cronJobName, metav1.GetOptions{})
if err != nil {
return err
}
if *cronjob.Spec.Suspend {
return nil
}
jobSpec := &batchv1.Job{
ObjectMeta: metav1.ObjectMeta{
Name: jobExecName + strconv.FormatInt(time.Now().UTC().UnixMilli(), 10),
Namespace: api.PackageNamespace,
Labels: map[string]string{"createdBy": "controller"},
},
Spec: cronjob.Spec.JobTemplate.Spec,
}
jobs := s.clientset.BatchV1().Jobs(api.PackageNamespace)
_, err = jobs.Create(ctx, jobSpec, metav1.CreateOptions{})
if err != nil {
return err
}
err = s.cleanupPrevRuns(ctx)
return err
}
func (s *ecrSecret) DelFromConfigMap(ctx context.Context, name string, namespace string) error {
cm, err := s.clientset.CoreV1().ConfigMaps(s.targetCluster).
Get(ctx, ConfigMapName, metav1.GetOptions{})
if err != nil {
return err
}
css := csset.NewCSSet(cm.Data[namespace])
css.Del(name)
cm.Data[namespace] = css.String()
if cm.Data[namespace] == "" {
delete(cm.Data, namespace)
}
_, err = s.clientset.CoreV1().ConfigMaps(s.targetCluster).
Update(ctx, cm, metav1.UpdateOptions{})
if err != nil {
return err
}
return nil
}
func (s *ecrSecret) GetSecretValues(ctx context.Context, namespace string) (map[string]interface{}, error) {
values := make(map[string]interface{})
var imagePullSecret [2]map[string]string
imagePullSecret[0] = make(map[string]string)
imagePullSecret[0]["name"] = ecrTokenName
imagePullSecret[1] = make(map[string]string)
imagePullSecret[1]["name"] = mirrorCredName
values["imagePullSecrets"] = imagePullSecret
return values, nil
}
func (s *ecrSecret) cleanupPrevRuns(ctx context.Context) error {
labelSelector := metav1.LabelSelector{MatchLabels: map[string]string{"createdBy": "controller"}}
deletePropagation := metav1.DeletePropagationBackground
jobs, err := s.clientset.BatchV1().Jobs(api.PackageNamespace).
List(ctx, metav1.ListOptions{LabelSelector: labels.Set(labelSelector.MatchLabels).String()})
if err != nil {
return err
}
for _, job := range jobs.Items {
if job.Status.Succeeded == 1 {
err := s.clientset.BatchV1().Jobs(api.PackageNamespace).
Delete(ctx, job.Name,
metav1.DeleteOptions{PropagationPolicy: &deletePropagation})
if err != nil {
return err
}
}
}
return nil
}
| 167 |
eks-anywhere-packages | aws | Go | package authenticator
import (
"context"
"strings"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
batchv1 "k8s.io/api/batch/v1"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes/fake"
"k8s.io/client-go/rest"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
func TestAuthFilename(t *testing.T) {
fakeConfig := rest.Config{}
t.Run("golden path for set HELM_REGISTRY_CONFIG", func(t *testing.T) {
testfile := "/test.txt"
t.Setenv("HELM_REGISTRY_CONFIG", testfile)
ecrAuth, err := NewECRSecret(&fakeConfig)
require.NoError(t, err)
val := ecrAuth.AuthFilename()
assert.Equal(t, val, testfile)
})
t.Run("golden path for no config or secrets", func(t *testing.T) {
t.Setenv("HELM_REGISTRY_CONFIG", "")
ecrAuth, _ := NewECRSecret(&fakeConfig)
val := ecrAuth.AuthFilename()
assert.Equal(t, val, "")
})
}
func TestAddToConfigMap(t *testing.T) {
ctx := context.TODO()
name := "test-name"
namespace := "eksa-packages"
cmdata := make(map[string]string)
clusterName := "w-test"
targetClusterNamespace := api.PackageNamespace + "-" + clusterName
t.Run("golden path for adding new namespace", func(t *testing.T) {
cmdata["otherns"] = "a"
mockClientset := fake.NewSimpleClientset(&v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: ConfigMapName,
Namespace: targetClusterNamespace,
},
Data: cmdata,
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.Initialize(clusterName)
require.NoError(t, err)
err = ecrAuth.AddToConfigMap(ctx, name, namespace)
require.NoError(t, err)
updatedCM, err := mockClientset.CoreV1().ConfigMaps(targetClusterNamespace).
Get(ctx, ConfigMapName, metav1.GetOptions{})
if assert.NoError(t, err) {
assert.Equal(t, name, updatedCM.Data[namespace])
assert.Equal(t, "a", updatedCM.Data["otherns"])
}
})
t.Run("golden path for adding one namespace", func(t *testing.T) {
cmdata[namespace] = "a"
mockClientset := fake.NewSimpleClientset(&v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: ConfigMapName,
Namespace: targetClusterNamespace,
},
Data: cmdata,
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.Initialize(clusterName)
require.NoError(t, err)
err = ecrAuth.AddToConfigMap(ctx, name, namespace)
require.NoError(t, err)
updatedCM, err := mockClientset.CoreV1().ConfigMaps(targetClusterNamespace).
Get(ctx, ConfigMapName, metav1.GetOptions{})
if assert.NoError(t, err) {
assert.ObjectsAreEqual([]string{"a", name},
strings.Split(updatedCM.Data[namespace], ","))
}
})
t.Run("golden path for not repeating name", func(t *testing.T) {
name = "a"
cmdata[namespace] = "a"
mockClientset := fake.NewSimpleClientset(&v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: ConfigMapName,
Namespace: targetClusterNamespace,
},
Data: cmdata,
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.Initialize(clusterName)
require.NoError(t, err)
err = ecrAuth.AddToConfigMap(ctx, name, namespace)
require.NoError(t, err)
updatedCM, _ := mockClientset.CoreV1().ConfigMaps(targetClusterNamespace).
Get(ctx, ConfigMapName, metav1.GetOptions{})
assert.Equal(t, "a", updatedCM.Data[namespace])
})
t.Run("fails if config map doesnt exist", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: ConfigMapName,
Namespace: "wrong-ns",
},
Data: cmdata,
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.Initialize(clusterName)
require.NoError(t, err)
err = ecrAuth.AddToConfigMap(ctx, name, namespace)
assert.NotNil(t, err)
})
}
func TestDelFromConfigMap(t *testing.T) {
ctx := context.TODO()
name := "test-name"
namespace := "eksa-packages"
cmdata := make(map[string]string)
clusterName := "w-test"
targetClusterNamespace := api.PackageNamespace + "-" + clusterName
t.Run("golden path for removing one name but still exists", func(t *testing.T) {
name = "a"
cmdata[namespace] = "a,b"
mockClientset := fake.NewSimpleClientset(&v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: ConfigMapName,
Namespace: targetClusterNamespace,
},
Data: cmdata,
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.Initialize(clusterName)
require.NoError(t, err)
err = ecrAuth.DelFromConfigMap(ctx, name, namespace)
require.NoError(t, err)
updatedCM, err := mockClientset.CoreV1().ConfigMaps(targetClusterNamespace).
Get(ctx, ConfigMapName, metav1.GetOptions{})
require.NoError(t, err)
val, exists := updatedCM.Data["eksa-packages"]
assert.Nil(t, err)
assert.True(t, exists)
assert.Equal(t, "b", val)
})
t.Run("golden path for removing one name", func(t *testing.T) {
name = "a"
cmdata[namespace] = "a"
mockClientset := fake.NewSimpleClientset(&v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: ConfigMapName,
Namespace: targetClusterNamespace,
},
Data: cmdata,
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.Initialize(clusterName)
require.NoError(t, err)
err = ecrAuth.DelFromConfigMap(ctx, name, namespace)
require.NoError(t, err)
updatedCM, err := mockClientset.CoreV1().ConfigMaps(targetClusterNamespace).
Get(ctx, ConfigMapName, metav1.GetOptions{})
require.NoError(t, err)
_, exists := updatedCM.Data["eksa-packages"]
assert.False(t, exists)
})
}
func TestGetSecretValues(t *testing.T) {
ctx := context.TODO()
secretdata := make(map[string][]byte)
namespace := "eksa-packages"
t.Run("golden path for Retrieving ECR Secret", func(t *testing.T) {
namespace = "test"
testdata := []byte("testdata")
secretdata[".dockerconfigjson"] = testdata
mockClientset := fake.NewSimpleClientset(&v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: ecrTokenName,
Namespace: api.PackageNamespace,
},
Data: secretdata,
Type: ".dockerconfigjson",
})
ecrAuth := ecrSecret{clientset: mockClientset}
values, err := ecrAuth.GetSecretValues(ctx, namespace)
assert.Nil(t, err)
assert.NotNil(t, values["imagePullSecrets"])
})
t.Run("golden path for Retrieving ECR Secret when namespace already exists", func(t *testing.T) {
namespace = "eksa-packages"
testdata := []byte("testdata")
secretdata[".dockerconfigjson"] = testdata
mockClientset := fake.NewSimpleClientset(&v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: ecrTokenName,
Namespace: api.PackageNamespace,
},
Data: secretdata,
Type: ".dockerconfigjson",
})
ecrAuth := ecrSecret{clientset: mockClientset}
values, err := ecrAuth.GetSecretValues(ctx, namespace)
assert.Nil(t, err)
assert.NotNil(t, values["imagePullSecrets"])
_, exists := values["pullSecretName"]
assert.False(t, exists)
_, exists = values["pullSecretData"]
assert.False(t, exists)
})
}
func TestAddSecretToAllNamespace(t *testing.T) {
ctx := context.TODO()
suspend := false
t.Run("golden path for adding ECR Secret to all namespaces", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&batchv1.CronJob{
ObjectMeta: metav1.ObjectMeta{
Name: cronJobName,
Namespace: api.PackageNamespace,
},
Spec: batchv1.CronJobSpec{
Suspend: &suspend,
},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.AddSecretToAllNamespace(ctx)
assert.NoError(t, err)
jobs, err := mockClientset.BatchV1().Jobs(api.PackageNamespace).List(ctx, metav1.ListOptions{})
assert.NoError(t, err)
assert.NotNil(t, jobs.Items)
})
t.Run("golden path for adding ECR Secret to all namespaces with missing job", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&batchv1.CronJob{
ObjectMeta: metav1.ObjectMeta{
Name: "wrong-name",
Namespace: api.PackageNamespace,
},
Spec: batchv1.CronJobSpec{
Suspend: &suspend,
},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.AddSecretToAllNamespace(ctx)
assert.NotNil(t, err)
})
t.Run("golden path for adding ECR Secret to all namespaces with missing job in namespace", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&batchv1.CronJob{
ObjectMeta: metav1.ObjectMeta{
Name: cronJobName,
Namespace: "wrong-ns",
},
Spec: batchv1.CronJobSpec{
Suspend: &suspend,
},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.AddSecretToAllNamespace(ctx)
assert.NotNil(t, err)
})
t.Run("golden path for adding ECR Secret to all namespaces skipping if suspended cronjob", func(t *testing.T) {
suspend = true
mockClientset := fake.NewSimpleClientset(&batchv1.CronJob{
ObjectMeta: metav1.ObjectMeta{
Name: cronJobName,
Namespace: api.PackageNamespace,
},
Spec: batchv1.CronJobSpec{
Suspend: &suspend,
},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.AddSecretToAllNamespace(ctx)
assert.NoError(t, err)
jobs, err := mockClientset.BatchV1().Jobs(api.PackageNamespace).List(ctx, metav1.ListOptions{})
assert.NoError(t, err)
assert.Nil(t, jobs.Items)
})
}
func TestCleanupPrevRuns(t *testing.T) {
ctx := context.TODO()
t.Run("golden path for deleting old auth pods", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&batchv1.Job{
ObjectMeta: metav1.ObjectMeta{
Name: jobExecName + "1",
Namespace: api.PackageNamespace,
Labels: map[string]string{"createdBy": "controller"},
},
Status: batchv1.JobStatus{Succeeded: 1},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.cleanupPrevRuns(ctx)
assert.NoError(t, err)
jobs, err := mockClientset.BatchV1().Jobs(api.PackageNamespace).List(ctx, metav1.ListOptions{})
assert.NoError(t, err)
assert.Nil(t, jobs.Items)
})
t.Run("golden path for not deleting running auth pods", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&batchv1.Job{
ObjectMeta: metav1.ObjectMeta{
Name: jobExecName + "1",
Namespace: api.PackageNamespace,
Labels: map[string]string{"createdBy": "controller"},
},
Status: batchv1.JobStatus{Succeeded: 0},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.cleanupPrevRuns(ctx)
assert.NoError(t, err)
jobs, err := mockClientset.BatchV1().Jobs(api.PackageNamespace).List(ctx, metav1.ListOptions{})
assert.NoError(t, err)
assert.NotNil(t, jobs.Items)
})
t.Run("golden path for not deleting jobs not created by controller", func(t *testing.T) {
mockClientset := fake.NewSimpleClientset(&batchv1.Job{
ObjectMeta: metav1.ObjectMeta{
Name: jobExecName + "1",
Namespace: api.PackageNamespace,
},
Status: batchv1.JobStatus{Succeeded: 1},
})
ecrAuth := ecrSecret{clientset: mockClientset}
err := ecrAuth.cleanupPrevRuns(ctx)
assert.NoError(t, err)
jobs, err := mockClientset.BatchV1().Jobs(api.PackageNamespace).List(ctx, metav1.ListOptions{})
assert.NoError(t, err)
assert.NotNil(t, jobs.Items)
})
}
| 384 |
eks-anywhere-packages | aws | Go | package authenticator
import (
"context"
"fmt"
"os"
"github.com/go-logr/logr"
corev1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/api/meta"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"k8s.io/apimachinery/pkg/version"
"k8s.io/client-go/discovery"
"k8s.io/client-go/discovery/cached/memory"
"k8s.io/client-go/rest"
"k8s.io/client-go/restmapper"
"k8s.io/client-go/tools/clientcmd"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
"sigs.k8s.io/controller-runtime/pkg/client"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
const (
clusterNameEnvVar = "CLUSTER_NAME"
eksaSystemNamespace = "eksa-system"
)
//go:generate mockgen -source target_cluster_client.go -destination=mocks/target_cluster_client.go -package=mocks TargetClusterClient
type TargetClusterClient interface {
// Init the target cluster client
Initialize(ctx context.Context, clusterName string) error
// GetServerVersion of the target api server
GetServerVersion(ctx context.Context, clusterName string) (info *version.Info, err error)
// CreateClusterNamespace for the workload cluster.
CreateClusterNamespace(ctx context.Context, clusterName string) (err error)
// CheckNamespace tests for the existence of a namespace.
CheckNamespace(ctx context.Context, namespace string) bool
// ApplySecret for the workload cluster
ApplySecret(ctx context.Context, secret *corev1.Secret) (err error)
// Implement RESTClientGetter
ToRESTConfig() (*rest.Config, error)
ToDiscoveryClient() (discovery.CachedDiscoveryInterface, error)
ToRESTMapper() (meta.RESTMapper, error)
ToRawKubeConfigLoader() clientcmd.ClientConfig
}
type targetClusterClient struct {
Config *rest.Config
Client client.Client
targetSelf bool
clientConfig clientcmd.ClientConfig
logger logr.Logger
}
var _ TargetClusterClient = (*targetClusterClient)(nil)
func NewTargetClusterClient(logger logr.Logger, config *rest.Config, client client.Client) *targetClusterClient {
return &targetClusterClient{logger: logger, Config: config, Client: client}
}
func (tcc *targetClusterClient) Initialize(ctx context.Context, clusterName string) error {
kubeconfig, err := tcc.getKubeconfig(ctx, clusterName)
if err != nil {
return err
}
tcc.targetSelf = false
if kubeconfig == nil {
tcc.targetSelf = true
tcc.clientConfig = clientcmd.NewDefaultClientConfig(clientcmdapi.Config{}, &clientcmd.ConfigOverrides{})
return nil
}
clientConfig, err := clientcmd.NewClientConfigFromBytes(kubeconfig)
if err != nil {
return err
}
rawConfig, err := clientConfig.RawConfig()
if err != nil {
return err
}
tcc.clientConfig = clientcmd.NewDefaultClientConfig(rawConfig, &clientcmd.ConfigOverrides{})
return nil
}
func (tcc *targetClusterClient) ToRESTConfig() (*rest.Config, error) {
if tcc.targetSelf {
return tcc.Config, nil
}
return tcc.clientConfig.ClientConfig()
}
func (tcc *targetClusterClient) ToDiscoveryClient() (discovery.CachedDiscoveryInterface, error) {
restConfig, err := tcc.ToRESTConfig()
if err != nil {
return nil, err
}
dc, err := discovery.NewDiscoveryClientForConfig(restConfig)
if err != nil {
return nil, err
}
return memory.NewMemCacheClient(dc), nil
}
func (tcc *targetClusterClient) ToRESTMapper() (meta.RESTMapper, error) {
dc, err := tcc.ToDiscoveryClient()
if err != nil {
return nil, err
}
return restmapper.NewDeferredDiscoveryRESTMapper(dc), nil
}
func (tcc *targetClusterClient) ToRawKubeConfigLoader() clientcmd.ClientConfig {
return tcc.clientConfig
}
func (tcc *targetClusterClient) getKubeconfig(ctx context.Context, clusterName string) (kubeconfig []byte, err error) {
// Avoid using kubeconfig for ourselves
if clusterName == "" || os.Getenv(clusterNameEnvVar) == clusterName {
// Empty string will cause helm to use the current cluster
return nil, nil
}
secretName := clusterName + "-kubeconfig"
nn := types.NamespacedName{
Namespace: eksaSystemNamespace,
Name: secretName,
}
var kubeconfigSecret corev1.Secret
if err = tcc.Client.Get(ctx, nn, &kubeconfigSecret); err != nil {
return []byte{}, fmt.Errorf("getting kubeconfig for cluster %q: %w", clusterName, err)
}
return kubeconfigSecret.Data["value"], nil
}
func (tcc *targetClusterClient) GetServerVersion(ctx context.Context, clusterName string) (info *version.Info, err error) {
err = tcc.Initialize(ctx, clusterName)
if err != nil {
return nil, fmt.Errorf("initializing target client: %s", err)
}
discoveryClient, err := tcc.ToDiscoveryClient()
if err != nil {
return nil, fmt.Errorf("creating discoveryClient client: %s", err)
}
info, err = discoveryClient.ServerVersion()
if err != nil {
return nil, fmt.Errorf("getting server version: %w", err)
}
return info, nil
}
func (tcc *targetClusterClient) CreateClusterNamespace(ctx context.Context, clusterName string) (err error) {
err = tcc.Initialize(ctx, clusterName)
if err != nil {
return fmt.Errorf("initializing target client: %s", err)
}
restConfig, err := tcc.ToRESTConfig()
if err != nil {
return fmt.Errorf("create rest config for %s: %s", clusterName, err)
}
k8sClient, err := client.New(restConfig, client.Options{})
if err != nil {
return fmt.Errorf("creating client for %s: %s", clusterName, err)
}
if !tcc.CheckNamespace(ctx, api.PackageNamespace) {
err := k8sClient.Create(ctx, &corev1.Namespace{
ObjectMeta: metav1.ObjectMeta{Name: api.PackageNamespace},
})
if err != nil {
return fmt.Errorf("create namespace for %q: %s", clusterName, err)
}
}
return nil
}
// CheckNamespace tests for the existence of a namespace.
//
// It must only be called with an initialized target cluster client.
func (tcc *targetClusterClient) CheckNamespace(ctx context.Context, namespace string) bool {
if tcc.clientConfig == nil {
tcc.logger.Error(fmt.Errorf("client is not initialized"), "checking namespace", "namespace", "namespace")
return false
}
restConfig, err := tcc.ToRESTConfig()
if err != nil {
tcc.logger.V(6).Error(err, "creating rest config", "namespace", namespace)
return false
}
k8sClient, err := client.New(restConfig, client.Options{})
if err != nil {
tcc.logger.V(6).Error(err, "creating k8s client", "namespace", namespace)
return false
}
nn := types.NamespacedName{Name: namespace}
ns := &corev1.Namespace{}
if err := k8sClient.Get(ctx, nn, ns); err != nil {
if !apierrors.IsNotFound(err) {
tcc.logger.V(6).Error(err, "getting namespace", "namespace", namespace)
}
return false
}
return true
}
// ApplySecret on the workload cluster
//
// It must only be called with an initialized target cluster client.
func (tcc *targetClusterClient) ApplySecret(ctx context.Context, secret *corev1.Secret) error {
if tcc.clientConfig == nil {
tcc.logger.Error(fmt.Errorf("client is not initialized"), "creating secret")
return fmt.Errorf("client is not initialized")
}
restConfig, err := tcc.ToRESTConfig()
if err != nil {
tcc.logger.V(6).Error(err, "creating rest config")
return err
}
k8sClient, err := client.New(restConfig, client.Options{})
if err != nil {
tcc.logger.V(6).Error(err, "creating k8s client")
return err
}
newSecret := corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: secret.ObjectMeta.Name,
Namespace: secret.ObjectMeta.Namespace,
},
Data: secret.Data,
}
err = k8sClient.Create(ctx, &newSecret)
if err != nil {
if !apierrors.IsAlreadyExists(err) {
return fmt.Errorf("create secret for workload cluster %s", err)
}
err := k8sClient.Update(ctx, &newSecret)
if err != nil {
return fmt.Errorf("update secret for workload cluster %s", err)
}
}
return nil
}
| 267 |
eks-anywhere-packages | aws | Go | package authenticator
import (
"context"
"fmt"
"testing"
"github.com/go-logr/logr/testr"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
"github.com/aws/eks-anywhere-packages/controllers/mocks"
)
const actualData = `
apiVersion: v1
clusters:
- cluster:
certificate-authority-data: LS0t
server: https://127.0.0.1:6443
name: billy
contexts:
- context:
cluster: billy
user: billy-admin
name: billy-admin@billy
kind: Config
preferences: {}
users:
- name: billy-admin
user:
client-certificate-data: LS0t
client-key-data: LS0t
`
func TestTargetClusterClient_Init(t *testing.T) {
ctx := context.Background()
setKubeConfigSecret := func(src *corev1.Secret) func(_ context.Context, _ types.NamespacedName, kc *corev1.Secret, _ ...client.GetOption) error {
return func(ctx context.Context, name types.NamespacedName, target *corev1.Secret, _ ...client.GetOption) error {
src.DeepCopyInto(target)
return nil
}
}
t.Run("get kubeconfig success", func(t *testing.T) {
logger := testr.New(t)
mockClient := mocks.NewMockClient(gomock.NewController(t))
sut := NewTargetClusterClient(logger, nil, mockClient)
var kubeconfigSecret corev1.Secret
kubeconfigSecret.Data = make(map[string][]byte)
kubeconfigSecret.Data["value"] = []byte(actualData)
nn := types.NamespacedName{
Namespace: "eksa-system",
Name: "billy-kubeconfig",
}
mockClient.EXPECT().Get(ctx, nn, gomock.Any()).DoAndReturn(setKubeConfigSecret(&kubeconfigSecret)).Return(nil)
t.Setenv("CLUSTER_NAME", "franky")
err := sut.Initialize(ctx, "billy")
assert.NoError(t, err)
})
t.Run("get kubeconfig CLUSTER_NAME success", func(t *testing.T) {
logger := testr.New(t)
mockClient := mocks.NewMockClient(gomock.NewController(t))
sut := NewTargetClusterClient(logger, nil, mockClient)
t.Setenv("CLUSTER_NAME", "billy")
err := sut.Initialize(ctx, "billy")
assert.NoError(t, err)
})
t.Run("get kubeconfig failure", func(t *testing.T) {
logger := testr.New(t)
mockClient := mocks.NewMockClient(gomock.NewController(t))
sut := NewTargetClusterClient(logger, nil, mockClient)
nn := types.NamespacedName{
Namespace: "eksa-system",
Name: "billy-kubeconfig",
}
t.Setenv("CLUSTER_NAME", "franky")
mockClient.EXPECT().Get(ctx, nn, gomock.Any()).Return(fmt.Errorf("boom"))
err := sut.Initialize(ctx, "billy")
assert.EqualError(t, err, "getting kubeconfig for cluster \"billy\": boom")
})
t.Run("get kubeconfig no cluster", func(t *testing.T) {
logger := testr.New(t)
mockClient := mocks.NewMockClient(gomock.NewController(t))
sut := NewTargetClusterClient(logger, nil, mockClient)
// TODO do we need to support this case?
err := sut.Initialize(ctx, "")
assert.NoError(t, err)
})
}
| 101 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: authenticator.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
gomock "github.com/golang/mock/gomock"
)
// MockAuthenticator is a mock of Authenticator interface.
type MockAuthenticator struct {
ctrl *gomock.Controller
recorder *MockAuthenticatorMockRecorder
}
// MockAuthenticatorMockRecorder is the mock recorder for MockAuthenticator.
type MockAuthenticatorMockRecorder struct {
mock *MockAuthenticator
}
// NewMockAuthenticator creates a new mock instance.
func NewMockAuthenticator(ctrl *gomock.Controller) *MockAuthenticator {
mock := &MockAuthenticator{ctrl: ctrl}
mock.recorder = &MockAuthenticatorMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockAuthenticator) EXPECT() *MockAuthenticatorMockRecorder {
return m.recorder
}
// AddSecretToAllNamespace mocks base method.
func (m *MockAuthenticator) AddSecretToAllNamespace(ctx context.Context) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddSecretToAllNamespace", ctx)
ret0, _ := ret[0].(error)
return ret0
}
// AddSecretToAllNamespace indicates an expected call of AddSecretToAllNamespace.
func (mr *MockAuthenticatorMockRecorder) AddSecretToAllNamespace(ctx interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddSecretToAllNamespace", reflect.TypeOf((*MockAuthenticator)(nil).AddSecretToAllNamespace), ctx)
}
// AddToConfigMap mocks base method.
func (m *MockAuthenticator) AddToConfigMap(ctx context.Context, name, namespace string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AddToConfigMap", ctx, name, namespace)
ret0, _ := ret[0].(error)
return ret0
}
// AddToConfigMap indicates an expected call of AddToConfigMap.
func (mr *MockAuthenticatorMockRecorder) AddToConfigMap(ctx, name, namespace interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AddToConfigMap", reflect.TypeOf((*MockAuthenticator)(nil).AddToConfigMap), ctx, name, namespace)
}
// AuthFilename mocks base method.
func (m *MockAuthenticator) AuthFilename() string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "AuthFilename")
ret0, _ := ret[0].(string)
return ret0
}
// AuthFilename indicates an expected call of AuthFilename.
func (mr *MockAuthenticatorMockRecorder) AuthFilename() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "AuthFilename", reflect.TypeOf((*MockAuthenticator)(nil).AuthFilename))
}
// DelFromConfigMap mocks base method.
func (m *MockAuthenticator) DelFromConfigMap(ctx context.Context, name, namespace string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DelFromConfigMap", ctx, name, namespace)
ret0, _ := ret[0].(error)
return ret0
}
// DelFromConfigMap indicates an expected call of DelFromConfigMap.
func (mr *MockAuthenticatorMockRecorder) DelFromConfigMap(ctx, name, namespace interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DelFromConfigMap", reflect.TypeOf((*MockAuthenticator)(nil).DelFromConfigMap), ctx, name, namespace)
}
// GetSecretValues mocks base method.
func (m *MockAuthenticator) GetSecretValues(ctx context.Context, namespace string) (map[string]interface{}, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetSecretValues", ctx, namespace)
ret0, _ := ret[0].(map[string]interface{})
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetSecretValues indicates an expected call of GetSecretValues.
func (mr *MockAuthenticatorMockRecorder) GetSecretValues(ctx, namespace interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetSecretValues", reflect.TypeOf((*MockAuthenticator)(nil).GetSecretValues), ctx, namespace)
}
// Initialize mocks base method.
func (m *MockAuthenticator) Initialize(clusterName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Initialize", clusterName)
ret0, _ := ret[0].(error)
return ret0
}
// Initialize indicates an expected call of Initialize.
func (mr *MockAuthenticatorMockRecorder) Initialize(clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Initialize", reflect.TypeOf((*MockAuthenticator)(nil).Initialize), clusterName)
}
| 121 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: target_cluster_client.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
gomock "github.com/golang/mock/gomock"
v1 "k8s.io/api/core/v1"
meta "k8s.io/apimachinery/pkg/api/meta"
version "k8s.io/apimachinery/pkg/version"
discovery "k8s.io/client-go/discovery"
rest "k8s.io/client-go/rest"
clientcmd "k8s.io/client-go/tools/clientcmd"
)
// MockTargetClusterClient is a mock of TargetClusterClient interface.
type MockTargetClusterClient struct {
ctrl *gomock.Controller
recorder *MockTargetClusterClientMockRecorder
}
// MockTargetClusterClientMockRecorder is the mock recorder for MockTargetClusterClient.
type MockTargetClusterClientMockRecorder struct {
mock *MockTargetClusterClient
}
// NewMockTargetClusterClient creates a new mock instance.
func NewMockTargetClusterClient(ctrl *gomock.Controller) *MockTargetClusterClient {
mock := &MockTargetClusterClient{ctrl: ctrl}
mock.recorder = &MockTargetClusterClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockTargetClusterClient) EXPECT() *MockTargetClusterClientMockRecorder {
return m.recorder
}
// ApplySecret mocks base method.
func (m *MockTargetClusterClient) ApplySecret(ctx context.Context, secret *v1.Secret) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ApplySecret", ctx, secret)
ret0, _ := ret[0].(error)
return ret0
}
// ApplySecret indicates an expected call of ApplySecret.
func (mr *MockTargetClusterClientMockRecorder) ApplySecret(ctx, secret interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplySecret", reflect.TypeOf((*MockTargetClusterClient)(nil).ApplySecret), ctx, secret)
}
// CheckNamespace mocks base method.
func (m *MockTargetClusterClient) CheckNamespace(ctx context.Context, namespace string) bool {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CheckNamespace", ctx, namespace)
ret0, _ := ret[0].(bool)
return ret0
}
// CheckNamespace indicates an expected call of CheckNamespace.
func (mr *MockTargetClusterClientMockRecorder) CheckNamespace(ctx, namespace interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckNamespace", reflect.TypeOf((*MockTargetClusterClient)(nil).CheckNamespace), ctx, namespace)
}
// CreateClusterNamespace mocks base method.
func (m *MockTargetClusterClient) CreateClusterNamespace(ctx context.Context, clusterName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateClusterNamespace", ctx, clusterName)
ret0, _ := ret[0].(error)
return ret0
}
// CreateClusterNamespace indicates an expected call of CreateClusterNamespace.
func (mr *MockTargetClusterClientMockRecorder) CreateClusterNamespace(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateClusterNamespace", reflect.TypeOf((*MockTargetClusterClient)(nil).CreateClusterNamespace), ctx, clusterName)
}
// GetServerVersion mocks base method.
func (m *MockTargetClusterClient) GetServerVersion(ctx context.Context, clusterName string) (*version.Info, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetServerVersion", ctx, clusterName)
ret0, _ := ret[0].(*version.Info)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetServerVersion indicates an expected call of GetServerVersion.
func (mr *MockTargetClusterClientMockRecorder) GetServerVersion(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetServerVersion", reflect.TypeOf((*MockTargetClusterClient)(nil).GetServerVersion), ctx, clusterName)
}
// Initialize mocks base method.
func (m *MockTargetClusterClient) Initialize(ctx context.Context, clusterName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Initialize", ctx, clusterName)
ret0, _ := ret[0].(error)
return ret0
}
// Initialize indicates an expected call of Initialize.
func (mr *MockTargetClusterClientMockRecorder) Initialize(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Initialize", reflect.TypeOf((*MockTargetClusterClient)(nil).Initialize), ctx, clusterName)
}
// ToDiscoveryClient mocks base method.
func (m *MockTargetClusterClient) ToDiscoveryClient() (discovery.CachedDiscoveryInterface, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ToDiscoveryClient")
ret0, _ := ret[0].(discovery.CachedDiscoveryInterface)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ToDiscoveryClient indicates an expected call of ToDiscoveryClient.
func (mr *MockTargetClusterClientMockRecorder) ToDiscoveryClient() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToDiscoveryClient", reflect.TypeOf((*MockTargetClusterClient)(nil).ToDiscoveryClient))
}
// ToRESTConfig mocks base method.
func (m *MockTargetClusterClient) ToRESTConfig() (*rest.Config, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ToRESTConfig")
ret0, _ := ret[0].(*rest.Config)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ToRESTConfig indicates an expected call of ToRESTConfig.
func (mr *MockTargetClusterClientMockRecorder) ToRESTConfig() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToRESTConfig", reflect.TypeOf((*MockTargetClusterClient)(nil).ToRESTConfig))
}
// ToRESTMapper mocks base method.
func (m *MockTargetClusterClient) ToRESTMapper() (meta.RESTMapper, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ToRESTMapper")
ret0, _ := ret[0].(meta.RESTMapper)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ToRESTMapper indicates an expected call of ToRESTMapper.
func (mr *MockTargetClusterClientMockRecorder) ToRESTMapper() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToRESTMapper", reflect.TypeOf((*MockTargetClusterClient)(nil).ToRESTMapper))
}
// ToRawKubeConfigLoader mocks base method.
func (m *MockTargetClusterClient) ToRawKubeConfigLoader() clientcmd.ClientConfig {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ToRawKubeConfigLoader")
ret0, _ := ret[0].(clientcmd.ClientConfig)
return ret0
}
// ToRawKubeConfigLoader indicates an expected call of ToRawKubeConfigLoader.
func (mr *MockTargetClusterClientMockRecorder) ToRawKubeConfigLoader() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ToRawKubeConfigLoader", reflect.TypeOf((*MockTargetClusterClient)(nil).ToRawKubeConfigLoader))
}
| 172 |
eks-anywhere-packages | aws | Go | package bundle
import (
"context"
"fmt"
"os"
v1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
auth "github.com/aws/eks-anywhere-packages/pkg/authenticator"
)
//go:generate mockgen -source client.go -destination=mocks/client.go -package=mocks Client
type Client interface {
// GetActiveBundle retrieves the currently active bundle.
GetActiveBundle(ctx context.Context, clusterName string) (activeBundle *api.PackageBundle, err error)
// GetPackageBundleController retrieves clusters package bundle controller
GetPackageBundleController(ctx context.Context, clusterName string) (controller *api.PackageBundleController, err error)
// GetBundleList get list of bundles worthy of consideration
GetBundleList(ctx context.Context) (bundles []api.PackageBundle, err error)
// GetBundle retrieves the named bundle.
GetBundle(ctx context.Context, name string) (namedBundle *api.PackageBundle, err error)
// GetSecret retries the named secret
GetSecret(ctx context.Context, name string) (secret *v1.Secret, err error)
// CreateBundle add a new bundle custom resource
CreateBundle(ctx context.Context, bundle *api.PackageBundle) error
// CreateClusterConfigMap based on cluster name
CreateClusterConfigMap(ctx context.Context, clusterName string) error
// CreatePackage creates a package
CreatePackage(ctx context.Context, pkg *api.Package) (err error)
// GetPackageList retrieves the list of packages resources.
GetPackageList(ctx context.Context, namespace string) (packages api.PackageList, err error)
// SaveStatus saves a resource status
SaveStatus(ctx context.Context, object client.Object) error
// Save saves a resource
Save(ctx context.Context, object client.Object) error
}
type managerClient struct {
client.Client
}
func NewManagerClient(client client.Client) *managerClient {
return &(managerClient{
Client: client,
})
}
var _ Client = (*managerClient)(nil)
// GetActiveBundle retrieves the bundle from which package are installed.
//
// It retrieves the name of the active bundle from the PackageBundleController,
// then uses the K8s API to retrieve and return the active bundle.
func (bc *managerClient) GetActiveBundle(ctx context.Context, clusterName string) (activeBundle *api.PackageBundle, err error) {
pbc, err := bc.GetPackageBundleController(ctx, clusterName)
if err != nil {
return nil, err
}
if pbc.Spec.ActiveBundle == "" {
return nil, fmt.Errorf("no activeBundle set in PackageBundleController")
}
nn := types.NamespacedName{
Namespace: api.PackageNamespace,
Name: pbc.Spec.ActiveBundle,
}
activeBundle = &api.PackageBundle{}
err = bc.Get(ctx, nn, activeBundle)
if err != nil {
return nil, err
}
return activeBundle, nil
}
func (bc *managerClient) GetPackageBundleController(ctx context.Context, clusterName string) (*api.PackageBundleController, error) {
if clusterName == "" {
clusterName = os.Getenv("CLUSTER_NAME")
}
pbc := api.PackageBundleController{}
key := types.NamespacedName{
Namespace: api.PackageNamespace,
Name: clusterName,
}
err := bc.Get(ctx, key, &pbc)
if err != nil {
return nil, fmt.Errorf("getting PackageBundleController: %v", err)
}
return &pbc, nil
}
func (bc *managerClient) GetBundle(ctx context.Context, name string) (namedBundle *api.PackageBundle, err error) {
nn := types.NamespacedName{
Namespace: api.PackageNamespace,
Name: name,
}
namedBundle = &api.PackageBundle{}
err = bc.Get(ctx, nn, namedBundle)
if err != nil {
if apierrors.IsNotFound(err) {
return nil, nil
}
return nil, err
}
return namedBundle, nil
}
func (bc *managerClient) GetSecret(ctx context.Context, name string) (secret *v1.Secret, err error) {
nn := types.NamespacedName{
Namespace: api.PackageNamespace,
Name: name,
}
secret = &v1.Secret{}
err = bc.Get(ctx, nn, secret)
if err != nil {
if apierrors.IsNotFound(err) {
return nil, nil
}
return nil, fmt.Errorf("aws-secret error:%v", err)
}
return secret, nil
}
func (bc *managerClient) GetBundleList(ctx context.Context) (bundles []api.PackageBundle, err error) {
allBundles := &api.PackageBundleList{}
err = bc.Client.List(ctx, allBundles, &client.ListOptions{Namespace: api.PackageNamespace})
if err != nil {
return nil, fmt.Errorf("listing package bundles: %s", err)
}
return allBundles.Items, nil
}
func (bc *managerClient) CreateClusterNamespace(ctx context.Context, clusterName string) error {
name := api.PackageNamespace + "-" + clusterName
key := types.NamespacedName{
Name: name,
}
ns := &v1.Namespace{}
err := bc.Get(ctx, key, ns)
// Nil err check here means that the namespace exists thus we can just return with no error
if err == nil {
return nil
}
if !apierrors.IsNotFound(err) {
return err
}
ns.Name = name
err = bc.Client.Create(ctx, ns)
if err != nil {
return err
}
return nil
}
func (bc *managerClient) CreateClusterConfigMap(ctx context.Context, clusterName string) error {
name := auth.ConfigMapName
namespace := api.PackageNamespace + "-" + clusterName
key := types.NamespacedName{
Name: name,
Namespace: namespace,
}
cm := &v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
},
}
err := bc.Get(ctx, key, cm)
// Nil err check here means that the config map exists thus we can just return with no error
if err == nil {
return nil
}
if !apierrors.IsNotFound(err) {
return err
}
cm.Data = make(map[string]string)
cm.Data[namespace] = "eksa-package-controller"
// Unfortunate workaround for emissary webhooks hard coded crd namespace
cm.Data["emissary-system"] = "eksa-package-placeholder"
err = bc.Client.Create(ctx, cm)
if err != nil {
return err
}
return nil
}
// CreatePackage creates the given package resource
func (p *managerClient) CreatePackage(ctx context.Context, pkg *api.Package) (err error) {
return p.Client.Create(ctx, pkg)
}
// GetPackageList retrieves all packages present in the given namespace
func (p *managerClient) GetPackageList(ctx context.Context, namespace string) (packages api.PackageList, err error) {
list := api.PackageList{}
return list, p.Client.List(ctx, &list, client.InNamespace(namespace))
}
func (bc *managerClient) CreateBundle(ctx context.Context, bundle *api.PackageBundle) error {
err := bc.Client.Create(ctx, bundle)
if err != nil {
return fmt.Errorf("creating new package bundle: %s", err)
}
return nil
}
func (bc *managerClient) SaveStatus(ctx context.Context, object client.Object) error {
return bc.Client.Status().Update(ctx, object, &client.SubResourceUpdateOptions{})
}
func (bc *managerClient) Save(ctx context.Context, object client.Object) error {
return bc.Client.Update(ctx, object, &client.UpdateOptions{})
}
| 239 |
eks-anywhere-packages | aws | Go | package bundle
import (
"context"
"fmt"
"testing"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
v1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
ctrlmocks "github.com/aws/eks-anywhere-packages/controllers/mocks"
)
const (
testBundleRegistry = "public.ecr.aws/l0g8r8j6"
)
func givenMockClient(t *testing.T) *ctrlmocks.MockClient {
goMockController := gomock.NewController(t)
return ctrlmocks.NewMockClient(goMockController)
}
func givenBundle() *api.PackageBundle {
return &api.PackageBundle{
ObjectMeta: metav1.ObjectMeta{
Name: testBundleName,
Namespace: api.PackageNamespace,
},
Spec: api.PackageBundleSpec{
Packages: []api.BundlePackage{
{
Name: "hello-eks-anywhere",
Source: api.BundlePackageSource{
Registry: "public.ecr.aws/l0g8r8j6",
Repository: "hello-eks-anywhere",
Versions: []api.SourceVersion{
{Name: "0.1.1", Digest: "sha256:deadbeef"},
{Name: "0.1.0", Digest: "sha256:cafebabe"},
},
},
},
},
},
}
}
func givenPackageBundleController() *api.PackageBundleController {
return &api.PackageBundleController{
ObjectMeta: metav1.ObjectMeta{
Name: "cluster01",
Namespace: api.PackageNamespace,
},
Spec: api.PackageBundleControllerSpec{
ActiveBundle: testBundleName,
DefaultRegistry: "public.ecr.aws/l0g8r8j6",
DefaultImageRegistry: "783794618700.dkr.ecr.us-west-2.amazonaws.com",
BundleRepository: "eks-anywhere-packages-bundles",
},
Status: api.PackageBundleControllerStatus{
State: api.BundleControllerStateActive,
},
}
}
func TestNewPackageBundleClient(t *testing.T) {
t.Parallel()
t.Run("golden path", func(t *testing.T) {
t.Parallel()
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
assert.NotNil(t, bundleClient)
})
}
func TestBundleClient_GetActiveBundle(t *testing.T) {
t.Parallel()
ctx := context.Background()
pbc := givenPackageBundleController()
t.Run("golden path", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
testBundle := givenBundle()
mockClient.EXPECT().Get(ctx, gomock.Any(), gomock.AssignableToTypeOf(pbc)).SetArg(2, *pbc)
mockClient.EXPECT().Get(ctx, gomock.Any(), gomock.AssignableToTypeOf(testBundle)).SetArg(2, *testBundle)
bundle, err := bundleClient.GetActiveBundle(ctx, "billy")
assert.Equal(t, bundle.Name, testBundleName)
assert.Equal(t, "hello-eks-anywhere", bundle.Spec.Packages[0].Name)
assert.Equal(t, "public.ecr.aws/l0g8r8j6", bundle.Spec.Packages[0].Source.Registry)
assert.NoError(t, err)
})
t.Run("no active bundle", func(t *testing.T) {
pbc := givenPackageBundleController()
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
pbc.Spec.ActiveBundle = ""
mockClient.EXPECT().Get(ctx, gomock.Any(), gomock.AssignableToTypeOf(pbc)).SetArg(2, *pbc)
bundle, err := bundleClient.GetActiveBundle(ctx, "billy")
assert.Nil(t, bundle)
assert.EqualError(t, err, "no activeBundle set in PackageBundleController")
})
t.Run("error path", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, gomock.Any(), gomock.Any()).Return(fmt.Errorf("oops"))
_, err := bundleClient.GetActiveBundle(ctx, "billy")
assert.EqualError(t, err, "getting PackageBundleController: oops")
})
t.Run("other error path", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, gomock.Any(), gomock.AssignableToTypeOf(pbc)).SetArg(2, *pbc)
mockClient.EXPECT().Get(ctx, gomock.Any(), gomock.Any()).Return(fmt.Errorf("oops"))
_, err := bundleClient.GetActiveBundle(ctx, "billy")
assert.EqualError(t, err, "oops")
})
}
func doAndReturnBundleList(source *api.PackageBundleList) func(context.Context, *api.PackageBundleList, *client.ListOptions) error {
return func(ctx context.Context, target *api.PackageBundleList, options *client.ListOptions) error {
source.DeepCopyInto(target)
return nil
}
}
func doAndReturnBundle(_ context.Context, nn types.NamespacedName, theBundle *api.PackageBundle, _ ...client.GetOption) error {
theBundle.Name = nn.Name
return nil
}
func TestBundleClient_GetBundle(t *testing.T) {
t.Parallel()
ctx := context.Background()
namedBundle := &api.PackageBundle{}
namedBundle.Name = "v1-21-1003"
key := types.NamespacedName{
Name: "v1-21-1003",
Namespace: "eksa-packages",
}
t.Run("already exists", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, key, gomock.Any()).DoAndReturn(doAndReturnBundle)
actualBundle, err := bundleClient.GetBundle(ctx, "v1-21-1003")
assert.NotNil(t, actualBundle)
assert.NoError(t, err)
})
t.Run("already exists error", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(namedBundle)).Return(fmt.Errorf("boom"))
actualBundle, err := bundleClient.GetBundle(ctx, "v1-21-1003")
assert.Nil(t, actualBundle)
assert.EqualError(t, err, "boom")
})
t.Run("returns nil when bundle does not", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
groupResource := schema.GroupResource{
Group: key.Name,
Resource: "Namespace",
}
notFoundError := errors.NewNotFound(groupResource, key.Name)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(namedBundle)).Return(notFoundError)
actualBundle, err := bundleClient.GetBundle(ctx, "v1-21-1003")
assert.Nil(t, actualBundle)
assert.NoError(t, err)
})
}
func TestBundleClient_GetBundleList(t *testing.T) {
t.Parallel()
ctx := context.Background()
t.Run("golden path", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
testBundleList := &api.PackageBundleList{
Items: []api.PackageBundle{
{
ObjectMeta: metav1.ObjectMeta{
Name: "v1-16-1003",
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: "v1-21-1002",
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: "v1-21-1001",
},
},
},
}
mockClient.EXPECT().
List(ctx, gomock.Any(), &client.ListOptions{Namespace: api.PackageNamespace}).
DoAndReturn(doAndReturnBundleList(testBundleList))
bundleItems, err := bundleClient.GetBundleList(ctx)
require.NoError(t, err)
assert.ElementsMatch(t, bundleItems, testBundleList.Items)
})
t.Run("error scenario", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
actualList := &api.PackageBundleList{}
mockClient.EXPECT().List(ctx, actualList, &client.ListOptions{Namespace: api.PackageNamespace}).Return(fmt.Errorf("oops"))
bundleItems, err := bundleClient.GetBundleList(ctx)
assert.Nil(t, bundleItems)
assert.EqualError(t, err, "listing package bundles: oops")
})
}
func TestBundleClient_CreateBundle(t *testing.T) {
t.Parallel()
ctx := context.Background()
t.Run("golden path", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
actualBundle := &api.PackageBundle{}
mockClient.EXPECT().Create(ctx, actualBundle).Return(nil)
err := bundleClient.CreateBundle(ctx, actualBundle)
assert.NoError(t, err)
})
t.Run("error scenario", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
actualBundle := &api.PackageBundle{}
mockClient.EXPECT().Create(ctx, actualBundle).Return(fmt.Errorf("oops"))
err := bundleClient.CreateBundle(ctx, actualBundle)
assert.EqualError(t, err, "creating new package bundle: oops")
})
}
func TestBundleClient_CreateClusterNamespace(t *testing.T) {
t.Parallel()
ctx := context.Background()
ns := &v1.Namespace{}
ns.Name = "eksa-packages-bobby"
key := types.NamespacedName{
Name: "eksa-packages-bobby",
}
t.Run("already exists", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(ns)).Return(nil)
err := bundleClient.CreateClusterNamespace(ctx, "bobby")
assert.NoError(t, err)
})
t.Run("get error", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(ns)).Return(fmt.Errorf("boom"))
err := bundleClient.CreateClusterNamespace(ctx, "bobby")
assert.EqualError(t, err, "boom")
})
t.Run("create namespace", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
groupResource := schema.GroupResource{
Group: key.Name,
Resource: "Namespace",
}
notFoundError := errors.NewNotFound(groupResource, key.Name)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(ns)).Return(notFoundError)
mockClient.EXPECT().Create(ctx, ns).Return(nil)
err := bundleClient.CreateClusterNamespace(ctx, "bobby")
assert.NoError(t, err)
})
t.Run("create namespace error", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
groupResource := schema.GroupResource{
Group: key.Name,
Resource: "Namespace",
}
notFoundError := errors.NewNotFound(groupResource, key.Name)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(ns)).Return(notFoundError)
mockClient.EXPECT().Create(ctx, ns).Return(fmt.Errorf("boom"))
err := bundleClient.CreateClusterNamespace(ctx, "bobby")
assert.EqualError(t, err, "boom")
})
}
func TestBundleClient_CreateClusterConfigMap(t *testing.T) {
t.Parallel()
ctx := context.Background()
name := "ns-secret-map"
namespace := "eksa-packages-bobby"
key := types.NamespacedName{
Name: name,
Namespace: namespace,
}
cm := &v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: name,
Namespace: namespace,
},
}
cm.Data = make(map[string]string)
cm.Data[namespace] = "eksa-package-controller"
cm.Data["emissary-system"] = "eksa-package-placeholder"
t.Run("already exists", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(cm)).Return(nil)
err := bundleClient.CreateClusterConfigMap(ctx, "bobby")
assert.NoError(t, err)
})
t.Run("get error", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(cm)).Return(fmt.Errorf("boom"))
err := bundleClient.CreateClusterConfigMap(ctx, "bobby")
assert.EqualError(t, err, "boom")
})
t.Run("create configmap", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
groupResource := schema.GroupResource{
Group: key.Name,
Resource: "Namespace",
}
notFoundError := errors.NewNotFound(groupResource, key.Name)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(cm)).Return(notFoundError)
mockClient.EXPECT().Create(ctx, cm).Return(nil)
err := bundleClient.CreateClusterConfigMap(ctx, "bobby")
assert.NoError(t, err)
})
t.Run("create configmap error", func(t *testing.T) {
mockClient := givenMockClient(t)
bundleClient := NewManagerClient(mockClient)
groupResource := schema.GroupResource{
Group: key.Name,
Resource: "Namespace",
}
notFoundError := errors.NewNotFound(groupResource, key.Name)
mockClient.EXPECT().Get(ctx, key, gomock.AssignableToTypeOf(cm)).Return(notFoundError)
mockClient.EXPECT().Create(ctx, cm).Return(fmt.Errorf("boom"))
err := bundleClient.CreateClusterConfigMap(ctx, "bobby")
assert.EqualError(t, err, "boom")
})
}
| 419 |
eks-anywhere-packages | aws | Go | package bundle
import (
"context"
"fmt"
"os"
"time"
"github.com/go-logr/logr"
"golang.org/x/mod/semver"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/authenticator"
"github.com/aws/eks-anywhere-packages/pkg/config"
)
//go:generate mockgen -source manager.go -destination=mocks/manager.go -package=mocks Manager
type Manager interface {
// ProcessBundle returns true if there are changes
ProcessBundle(ctx context.Context, newBundle *api.PackageBundle) (bool, error)
// ProcessBundleController process the bundle controller
ProcessBundleController(ctx context.Context, pbc *api.PackageBundleController) error
}
type bundleManager struct {
log logr.Logger
bundleClient Client
registryClient RegistryClient
targetClient authenticator.TargetClusterClient
config config.Config
}
func NewBundleManager(log logr.Logger, registryClient RegistryClient, bundleClient Client, targetClient authenticator.TargetClusterClient, config config.Config) *bundleManager {
return &bundleManager{
log: log,
bundleClient: bundleClient,
registryClient: registryClient,
targetClient: targetClient,
config: config,
}
}
var _ Manager = (*bundleManager)(nil)
func (m bundleManager) ProcessBundle(_ context.Context, newBundle *api.PackageBundle) (bool, error) {
if newBundle.Namespace != api.PackageNamespace {
if newBundle.Status.State != api.PackageBundleStateIgnored {
newBundle.Spec.DeepCopyInto(&newBundle.Status.Spec)
newBundle.Status.State = api.PackageBundleStateIgnored
m.log.V(6).Info("update", "bundle", newBundle.Name, "state", newBundle.Status.State)
return true, nil
}
return false, nil
}
if !m.isCompatibleWith(newBundle) {
if newBundle.Status.State != api.PackageBundleStateUpgradeRequired {
newBundle.Spec.DeepCopyInto(&newBundle.Status.Spec)
newBundle.Status.State = api.PackageBundleStateUpgradeRequired
m.log.V(6).Info("update", "bundle", newBundle.Name, "state", newBundle.Status.State)
return true, nil
}
return false, nil
}
if !newBundle.IsValidVersion() {
if newBundle.Status.State != api.PackageBundleStateInvalid {
newBundle.Spec.DeepCopyInto(&newBundle.Status.Spec)
newBundle.Status.State = api.PackageBundleStateInvalid
m.log.V(6).Info("update", "bundle", newBundle.Name, "state", newBundle.Status.State)
return true, nil
}
return false, nil
}
if newBundle.Status.State != api.PackageBundleStateAvailable {
newBundle.Spec.DeepCopyInto(&newBundle.Status.Spec)
newBundle.Status.State = api.PackageBundleStateAvailable
m.log.V(6).Info("update", "bundle", newBundle.Name, "state", newBundle.Status.State)
return true, nil
}
return false, nil
}
func (m *bundleManager) isCompatibleWith(bundle *api.PackageBundle) bool {
currentVersion := m.config.BuildInfo.Version
return currentVersion == config.DEVELOPMENT || semver.Compare(currentVersion, bundle.Spec.MinVersion) >= 0
}
func (m *bundleManager) hasBundleNamed(bundles []api.PackageBundle, bundleName string) bool {
for _, b := range bundles {
if b.Name == bundleName {
return true
}
}
return false
}
func (m *bundleManager) ProcessBundleController(ctx context.Context, pbc *api.PackageBundleController) error {
info, err := m.targetClient.GetServerVersion(ctx, pbc.Name)
if err != nil {
m.log.Error(err, "Unable to get server version")
if pbc.Status.State == api.BundleControllerStateActive || pbc.Status.State == "" {
pbc.Status.Detail = err.Error()
pbc.Status.State = api.BundleControllerStateDisconnected
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s status to %s: %s", pbc.Name, pbc.Status.State, err)
}
}
return nil
}
if err := m.targetClient.Initialize(ctx, os.Getenv("CLUSTER_NAME")); err != nil {
m.log.Error(err, "failed to intialize cluster client of management cluster")
}
config, _ := m.targetClient.ToRESTConfig()
auth, _ := authenticator.NewECRSecret(config)
if err := auth.AddSecretToAllNamespace(ctx); err != nil {
m.log.Error(err, "failed to Update Secret in all namespaces")
} else {
time.Sleep(3 * time.Second)
}
latestBundle, err := m.registryClient.LatestBundle(ctx, pbc.GetBundleURI(), info.Major, info.Minor, pbc.Name)
if err != nil {
m.log.Error(err, "Unable to get latest bundle")
if pbc.Status.State == api.BundleControllerStateActive || pbc.Status.State == "" {
pbc.Status.State = api.BundleControllerStateDisconnected
pbc.Status.Detail = err.Error()
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s status to %s: %s", pbc.Name, pbc.Status.State, err)
}
}
return nil
}
allBundles, err := m.bundleClient.GetBundleList(ctx)
if err != nil {
return fmt.Errorf("getting bundle list: %s", err)
}
if !m.hasBundleNamed(allBundles, latestBundle.Name) {
err = m.bundleClient.CreateBundle(ctx, latestBundle)
if err != nil {
return err
}
}
latestBundleIsCurrentBundle := latestBundle.Name == pbc.Spec.ActiveBundle
if pbc.Spec.ActiveBundle == "" {
pbc.Status.State = ""
}
switch pbc.Status.State {
case api.BundleControllerStateActive:
err = m.bundleClient.CreateClusterConfigMap(ctx, pbc.Name)
if err != nil {
return fmt.Errorf("creating configmap for %s: %s", pbc.Name, err)
}
err = m.targetClient.CreateClusterNamespace(ctx, pbc.GetName())
if err != nil {
return fmt.Errorf("creating workload cluster namespace eksa-packages for %s: %s", pbc.Name, err)
}
if pbc.GetName() != os.Getenv("CLUSTER_NAME") {
secret, err := m.bundleClient.GetSecret(ctx, "aws-secret")
if err != nil {
return fmt.Errorf("getting aws secret eksa-packages:%s", err)
}
if secret != nil {
err = m.targetClient.ApplySecret(ctx, secret)
if err != nil {
return fmt.Errorf("creating workload cluster secret aws-secret:%s", err)
}
}
}
if len(pbc.Spec.ActiveBundle) > 0 {
if !m.hasBundleNamed(allBundles, pbc.Spec.ActiveBundle) {
activeBundle, err := m.registryClient.DownloadBundle(ctx, pbc.GetActiveBundleURI(), pbc.Name)
if err != nil {
m.log.Error(err, "Active bundle download failed", "bundle", pbc.Spec.ActiveBundle)
return nil
}
m.log.Info("Bundle downloaded", "bundle", pbc.Spec.ActiveBundle)
err = m.bundleClient.CreateBundle(ctx, activeBundle)
if err != nil {
m.log.Error(err, "Recreate active bundle failed", "bundle", pbc.Spec.ActiveBundle)
return nil
}
m.log.Info("Bundle created", "bundle", pbc.Spec.ActiveBundle)
}
}
if latestBundleIsCurrentBundle {
break
}
pbc.Status.State = api.BundleControllerStateUpgradeAvailable
m.log.V(6).Info("update", "PackageBundleController", pbc.Name, "state", pbc.Status.State)
pbc.Status.Detail = latestBundle.Name + " available"
pbc.Spec.DeepCopyInto(&pbc.Status.Spec)
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s status to %s: %s", pbc.Name, pbc.Status.State, err)
}
case api.BundleControllerStateUpgradeAvailable:
if !latestBundleIsCurrentBundle {
if pbc.Status.Detail != latestBundle.Name+" available" {
pbc.Status.Detail = latestBundle.Name + " available"
pbc.Spec.DeepCopyInto(&pbc.Status.Spec)
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s detail to %s: %s", pbc.Name, pbc.Status.Detail, err)
}
}
break
}
pbc.Status.State = api.BundleControllerStateActive
m.log.V(6).Info("update", "PackageBundleController", pbc.Name, "state", pbc.Status.State)
pbc.Status.Detail = ""
pbc.Spec.DeepCopyInto(&pbc.Status.Spec)
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s status to %s: %s", pbc.Name, pbc.Status.State, err)
}
case api.BundleControllerStateDisconnected:
pbc.Status.State = api.BundleControllerStateActive
m.log.V(6).Info("update", "PackageBundleController", pbc.Name, "state", pbc.Status.State)
pbc.Status.Detail = ""
pbc.Spec.DeepCopyInto(&pbc.Status.Spec)
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s status to %s: %s", pbc.Name, pbc.Status.State, err)
}
default:
if pbc.Spec.ActiveBundle != "" {
pbc.Status.State = api.BundleControllerStateActive
m.log.V(6).Info("update", "PackageBundleController", pbc.Name, "state", pbc.Status.State)
pbc.Status.Detail = ""
pbc.Spec.DeepCopyInto(&pbc.Status.Spec)
err = m.bundleClient.SaveStatus(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s status to %s: %s", pbc.Name, pbc.Status.State, err)
}
} else {
pbc.Spec.ActiveBundle = latestBundle.Name
m.log.V(6).Info("update", "PackageBundleController", pbc.Name, "activeBundle", pbc.Spec.ActiveBundle)
pbc.Status.Detail = ""
err = m.bundleClient.Save(ctx, pbc)
if err != nil {
return fmt.Errorf("updating %s activeBundle to %s: %s", pbc.Name, pbc.Spec.ActiveBundle, err)
}
}
}
return nil
}
| 265 |
eks-anywhere-packages | aws | Go | package bundle
import (
"context"
"fmt"
"os"
"testing"
"github.com/go-logr/logr/testr"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/version"
"k8s.io/client-go/rest"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/authenticator/mocks"
bundleMocks "github.com/aws/eks-anywhere-packages/pkg/bundle/mocks"
"github.com/aws/eks-anywhere-packages/pkg/config"
)
const (
testPreviousBundleName = "v1-21-1002"
testBundleName = "v1-21-1003"
testNextBundleName = "v1-21-1004"
testKubeMajor = "1"
testKubeMinor = "21"
testKubernetesVersion = "v1.21"
)
func GivenBundle(state api.PackageBundleStateEnum) *api.PackageBundle {
return &api.PackageBundle{
ObjectMeta: metav1.ObjectMeta{
Name: testBundleName,
Namespace: api.PackageNamespace,
},
Status: api.PackageBundleStatus{
State: state,
},
}
}
func givenBundleManager(t *testing.T) (*mocks.MockTargetClusterClient, *bundleMocks.MockRegistryClient, *bundleMocks.MockClient, *bundleManager) {
logger := testr.New(t)
ctrl := gomock.NewController(t)
tcc := mocks.NewMockTargetClusterClient(ctrl)
rc := bundleMocks.NewMockRegistryClient(ctrl)
bc := bundleMocks.NewMockClient(ctrl)
cfg := config.GetConfig()
cfg.BuildInfo.Version = "v2.2.2"
bm := NewBundleManager(logger, rc, bc, tcc, cfg)
return tcc, rc, bc, bm
}
func TestProcessBundle(t *testing.T) {
ctx := context.Background()
t.Run("ignore other namespaces", func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
bundle := GivenBundle("")
bundle.Namespace = "billy"
update, err := bm.ProcessBundle(ctx, bundle)
assert.True(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateIgnored, bundle.Status.State)
})
t.Run("already ignore other namespaces", func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
bundle := GivenBundle(api.PackageBundleStateIgnored)
bundle.Namespace = "billy"
update, err := bm.ProcessBundle(ctx, bundle)
assert.False(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateIgnored, bundle.Status.State)
})
t.Run("ignore invalid Kubernetes version", func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
bundle := GivenBundle(api.PackageBundleStateAvailable)
bundle.Name = "v1-21-x"
update, err := bm.ProcessBundle(ctx, bundle)
assert.True(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateInvalid, bundle.Status.State)
})
t.Run("marks state available", func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
bundle := GivenBundle("")
update, err := bm.ProcessBundle(ctx, bundle)
assert.True(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateAvailable, bundle.Status.State)
})
t.Run("already marked state available", func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
bundle := GivenBundle(api.PackageBundleStateAvailable)
bundle.Name = testPreviousBundleName
update, err := bm.ProcessBundle(ctx, bundle)
assert.False(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateAvailable, bundle.Status.State)
})
t.Run("newer controller version required", func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
bundle := GivenBundle("")
bundle.Spec.MinVersion = "v4.4.4"
bundle.Name = testPreviousBundleName
update, err := bm.ProcessBundle(ctx, bundle)
assert.True(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateUpgradeRequired, bundle.Status.State)
// No change results in no update needed
update, err = bm.ProcessBundle(ctx, bundle)
assert.False(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateUpgradeRequired, bundle.Status.State)
// Bundle becomes available after upgrade
bm.config.BuildInfo.Version = "v4.4.5"
update, err = bm.ProcessBundle(ctx, bundle)
assert.True(t, update)
assert.Equal(t, nil, err)
assert.Equal(t, api.PackageBundleStateAvailable, bundle.Status.State)
})
}
func TestBundleManager_ProcessBundleController(t *testing.T) {
t.Parallel()
ctx := context.Background()
info := version.Info{
GitVersion: testKubernetesVersion,
Major: "1",
Minor: "21",
}
allBundles := []api.PackageBundle{
{
ObjectMeta: metav1.ObjectMeta{
Name: testBundleName,
},
},
{
ObjectMeta: metav1.ObjectMeta{
Name: "v1-21-1001",
},
},
}
t.Run("active to active", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
})
t.Run("active missing active bundle", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Spec.ActiveBundle = "v1-21-1002"
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
rc.EXPECT().DownloadBundle(ctx, "public.ecr.aws/l0g8r8j6/eks-anywhere-packages-bundles:v1-21-1002", pbc.Name).Return(&allBundles[0], nil)
bc.EXPECT().CreateBundle(ctx, gomock.Any()).Return(nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil) // update available
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateUpgradeAvailable, pbc.Status.State)
})
t.Run("active missing active bundle download error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Spec.ActiveBundle = "v1-21-1002"
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
rc.EXPECT().DownloadBundle(ctx, "public.ecr.aws/l0g8r8j6/eks-anywhere-packages-bundles:v1-21-1002", pbc.Name).Return(&allBundles[0], fmt.Errorf("boom"))
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
})
t.Run("active missing active bundle create error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Spec.ActiveBundle = "v1-21-1002"
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
rc.EXPECT().DownloadBundle(ctx, "public.ecr.aws/l0g8r8j6/eks-anywhere-packages-bundles:v1-21-1002", pbc.Name).Return(&allBundles[0], nil)
bc.EXPECT().CreateBundle(ctx, gomock.Any()).Return(fmt.Errorf("boom"))
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
})
t.Run("active to active get bundles error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
assert.Equal(t, pbc.Spec.ActiveBundle, testBundleName)
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(nil, fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "getting bundle list: oops")
})
t.Run("active to disconnected", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
assert.Equal(t, pbc.Spec.ActiveBundle, testBundleName)
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, fmt.Errorf("ooops"))
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateDisconnected, pbc.Status.State)
})
t.Run("disconnected to disconnected", func(t *testing.T) {
tcc, rc, _, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateDisconnected
assert.Equal(t, pbc.Spec.ActiveBundle, testBundleName)
latestBundle := givenBundle()
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, fmt.Errorf("ooops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateDisconnected, pbc.Status.State)
})
t.Run("active to disconnected error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
assert.Equal(t, pbc.Spec.ActiveBundle, testBundleName)
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, fmt.Errorf("ooops"))
bc.EXPECT().SaveStatus(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 status to disconnected: oops")
})
t.Run("active to upgradeAvailable", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.GetName()).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateUpgradeAvailable, pbc.Status.State)
})
t.Run("active to cm error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(fmt.Errorf("boom"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "creating configmap for cluster01: boom")
})
t.Run("active to upgradeAvailable error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 status to upgrade available: oops")
})
t.Run("active to upgradeAvailable create error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "oops")
})
t.Run("upgradeAvailable to upgradeAvailable", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateUpgradeAvailable
pbc.Status.Detail = "v1-21-1004 available"
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateUpgradeAvailable, pbc.Status.State)
assert.Equal(t, "v1-21-1004 available", pbc.Status.Detail)
})
t.Run("upgradeAvailable to upgradeAvailable detail fix", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateUpgradeAvailable
pbc.Status.Detail = "v1-21-1003 available"
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateUpgradeAvailable, pbc.Status.State)
assert.Equal(t, "v1-21-1004 available", pbc.Status.Detail)
})
t.Run("upgradeAvailable to upgradeAvailable detail fix", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateUpgradeAvailable
pbc.Status.Detail = "v1-21-1003 available"
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 detail to v1-21-1004 available: oops")
})
t.Run("upgradeAvailable to active", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateUpgradeAvailable
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
assert.Equal(t, "", pbc.Status.Detail)
})
t.Run("upgradeAvailable to active error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateUpgradeAvailable
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 status to active: oops")
})
t.Run("disconnected to active", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateDisconnected
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
})
t.Run("disconnected to active error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = api.BundleControllerStateDisconnected
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 status to active: oops")
})
t.Run("nothing to active bundle set", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = ""
pbc.Spec.ActiveBundle = ""
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.GetName()).Return(nil).AnyTimes()
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().Save(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateEnum(""), pbc.Status.State)
assert.Equal(t, testNextBundleName, pbc.Spec.ActiveBundle)
})
t.Run("nothing to active bundle save error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = ""
pbc.Spec.ActiveBundle = ""
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().Save(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 activeBundle to v1-21-1004: oops")
})
t.Run("nothing to active state", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = ""
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).AnyTimes().Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
assert.Equal(t, testBundleName, pbc.Spec.ActiveBundle)
})
t.Run("nothing to active status save error", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
pbc.Status.State = ""
latestBundle := givenBundle()
latestBundle.Name = testNextBundleName
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).AnyTimes().Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateBundle(ctx, latestBundle).Return(nil)
bc.EXPECT().SaveStatus(ctx, pbc).Return(fmt.Errorf("oops"))
err := bm.ProcessBundleController(ctx, pbc)
assert.EqualError(t, err, "updating cluster01 status to active: oops")
})
t.Run("skip applying secret when pbc is mgmt", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
_ = os.Setenv("CLUSTER_NAME", pbc.Name)
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
err := bm.ProcessBundleController(ctx, pbc)
_ = os.Setenv("CLUSTER_NAME", "")
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
})
t.Run("active to active skip secret when pbc", func(t *testing.T) {
tcc, rc, bc, bm := givenBundleManager(t)
pbc := givenPackageBundleController()
_ = os.Setenv("CLUSTER_NAME", "other-cluster-name")
latestBundle := givenBundle()
tcc.EXPECT().GetServerVersion(ctx, pbc.Name).Return(&info, nil)
tcc.EXPECT().Initialize(ctx, gomock.Any()).Return(nil)
tcc.EXPECT().ToRESTConfig().Return(&rest.Config{}, nil)
tcc.EXPECT().CreateClusterNamespace(ctx, pbc.Name).Return(nil)
tcc.EXPECT().ApplySecret(ctx, gomock.Any()).Return(nil)
rc.EXPECT().LatestBundle(ctx, testBundleRegistry+"/eks-anywhere-packages-bundles", testKubeMajor, testKubeMinor, pbc.Name).Return(latestBundle, nil)
bc.EXPECT().GetBundleList(ctx).Return(allBundles, nil)
bc.EXPECT().CreateClusterConfigMap(ctx, pbc.Name).Return(nil)
bc.EXPECT().GetSecret(ctx, "aws-secret").Return(&corev1.Secret{}, nil)
err := bm.ProcessBundleController(ctx, pbc)
_ = os.Setenv("CLUSTER_NAME", "")
assert.NoError(t, err)
assert.Equal(t, api.BundleControllerStateActive, pbc.Status.State)
})
}
func TestBundleManager_isCompatible(t *testing.T) {
t.Parallel()
tests := map[string]struct {
minVersion string
curVersion string
isCompatible bool
}{
"same version": {minVersion: "v2.2.2", curVersion: "v2.2.2", isCompatible: true},
"development is compatible with anything": {minVersion: "v2.2.2", curVersion: "development", isCompatible: true},
"newer patch version requirement makes it incompatible": {minVersion: "v2.2.3", curVersion: "v2.2.2", isCompatible: false},
"newer minor version requirement makes it incompatible": {minVersion: "v2.3.2", curVersion: "v2.2.2", isCompatible: false},
"newer major version requirement makes it incompatible": {minVersion: "v3.2.2", curVersion: "v2.2.2", isCompatible: false},
"build info is irrelevant": {minVersion: "v2.2.2", curVersion: "v2.2.2+shasum", isCompatible: true},
"build info is irrelevant also if incompatible": {minVersion: "v2.2.3", curVersion: "v2.2.2+shasum", isCompatible: false},
"invalid pkg version is incompatible": {minVersion: "v2.2.3", curVersion: "2.2.3", isCompatible: false},
"both invalid version is compatible, I suppose?": {minVersion: "2.2.3", curVersion: "2.2.2", isCompatible: true},
"any version is compatible when no requirements imposed": {minVersion: "", curVersion: "2.2.2", isCompatible: true},
}
for name, test := range tests {
t.Run(name, func(t *testing.T) {
_, _, _, bm := givenBundleManager(t)
latestBundle := givenBundle()
latestBundle.Spec.MinVersion = test.minVersion
bm.config.BuildInfo.Version = test.curVersion
assert.Equal(t, test.isCompatible, bm.isCompatibleWith(latestBundle))
})
}
}
| 694 |
eks-anywhere-packages | aws | Go | package bundle
import (
"bytes"
"context"
"fmt"
"sigs.k8s.io/yaml"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/artifacts"
)
//go:generate mockgen -source registry_client.go -destination=mocks/registry_client.go -package=mocks RegistryClient
type RegistryClient interface {
// LatestBundle pulls the bundle tagged with "latest" from the bundle source.
LatestBundle(ctx context.Context, baseRef string, kubeMajor string, kubeMinor string, clusterName string) (*api.PackageBundle, error)
// DownloadBundle downloads the bundle with a given tag.
DownloadBundle(ctx context.Context, ref string, clusterName string) (
*api.PackageBundle, error)
}
type registryClient struct {
puller artifacts.Puller
}
func NewRegistryClient(puller artifacts.Puller) (manager *registryClient) {
return ®istryClient{
puller: puller,
}
}
var _ RegistryClient = (*registryClient)(nil)
// LatestBundle pulls the bundle tagged with "latest" from the bundle source.
//
// It returns an error if the bundle it retrieves is empty. This is because an
// empty file would be successfully parsed and a Zero-value PackageBundle
// returned, which is not acceptable.
func (rc *registryClient) LatestBundle(ctx context.Context, baseRef string, kubeMajor string, kubeMinor string, clusterName string) (*api.PackageBundle, error) {
tag := "latest"
ref := fmt.Sprintf("%s:v%s-%s-%s", baseRef, kubeMajor, kubeMinor, tag)
return rc.DownloadBundle(ctx, ref, clusterName)
}
func (rc *registryClient) DownloadBundle(ctx context.Context, ref string, clusterName string) (*api.PackageBundle, error) {
data, err := rc.puller.Pull(ctx, ref, clusterName)
if err != nil {
return nil, fmt.Errorf("pulling package bundle: %s", err)
}
if len(bytes.TrimSpace(data)) == 0 {
return nil, fmt.Errorf("package bundle artifact is empty")
}
bundle := &api.PackageBundle{}
err = yaml.Unmarshal(data, bundle)
if err != nil {
return nil, fmt.Errorf("unmarshalling package bundle: %s", err)
}
return bundle, nil
}
| 66 |
eks-anywhere-packages | aws | Go | package bundle
import (
"context"
"fmt"
"os"
"testing"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
"github.com/aws/eks-anywhere-packages/pkg/artifacts/mocks"
)
func TestDownloadBundle(t *testing.T) {
t.Parallel()
baseRef := "example.com/org"
t.Run("golden path", func(t *testing.T) {
t.Parallel()
ctx := context.Background()
puller := mocks.NewMockPuller(gomock.NewController(t))
contents, err := os.ReadFile("../../api/testdata/bundle_one.yaml")
assert.NoError(t, err)
puller.EXPECT().Pull(ctx, "example.com/org:v1-21-latest", gomock.Any()).Return(contents, nil)
ecr := NewRegistryClient(puller)
kubeVersion := "v1-21"
tag := "latest"
ref := fmt.Sprintf("%s:%s-%s", baseRef, kubeVersion, tag)
bundle, err := ecr.DownloadBundle(ctx, ref, gomock.Any().String())
assert.NoError(t, err)
assert.NotNil(t, bundle)
assert.Equal(t, 3, len(bundle.Spec.Packages))
assert.Equal(t, "hello-eks-anywhere", bundle.Spec.Packages[0].Name)
assert.Equal(t, "flux", bundle.Spec.Packages[1].Name)
assert.Equal(t, "harbor", bundle.Spec.Packages[2].Name)
})
t.Run("handles pull errors", func(t *testing.T) {
t.Parallel()
ctx := context.Background()
puller := mocks.NewMockPuller(gomock.NewController(t))
puller.EXPECT().Pull(ctx, "example.com/org:v1-21-latest", gomock.Any()).Return(nil, fmt.Errorf("test error"))
ecr := NewRegistryClient(puller)
kubeVersion := "v1-21"
tag := "latest"
ref := fmt.Sprintf("%s:%s-%s", baseRef, kubeVersion, tag)
_, err := ecr.DownloadBundle(ctx, ref, gomock.Any().String())
assert.EqualError(t, err, "pulling package bundle: test error")
})
t.Run("errors on empty responses", func(t *testing.T) {
t.Parallel()
ctx := context.Background()
puller := mocks.NewMockPuller(gomock.NewController(t))
puller.EXPECT().Pull(ctx, "example.com/org:v1-21-latest", gomock.Any()).Return([]byte(""), nil)
ecr := NewRegistryClient(puller)
kubeVersion := "v1-21"
tag := "latest"
ref := fmt.Sprintf("%s:%s-%s", baseRef, kubeVersion, tag)
_, err := ecr.DownloadBundle(ctx, ref, gomock.Any().String())
assert.EqualError(t, err, "package bundle artifact is empty")
})
t.Run("handles YAML unmarshalling errors", func(t *testing.T) {
t.Parallel()
ctx := context.Background()
puller := mocks.NewMockPuller(gomock.NewController(t))
puller.EXPECT().Pull(ctx, "example.com/org:v1-21-latest", gomock.Any()).Return([]byte("invalid yaml"), nil)
ecr := NewRegistryClient(puller)
kubeVersion := "v1-21"
tag := "latest"
ref := fmt.Sprintf("%s:%s-%s", baseRef, kubeVersion, tag)
_, err := ecr.DownloadBundle(ctx, ref, gomock.Any().String())
assert.EqualError(t, err, "unmarshalling package bundle: error unmarshaling JSON: while decoding JSON: json: cannot unmarshal string into Go value of type v1alpha1.PackageBundle")
})
}
func TestRegistryClient_LatestBundle(t *testing.T) {
t.Parallel()
ctx := context.Background()
t.Run("latest bundle error", func(t *testing.T) {
puller := mocks.NewMockPuller(gomock.NewController(t))
puller.EXPECT().Pull(ctx, "test:v1-21-latest", gomock.Any()).Return(nil, fmt.Errorf("oops"))
bm := NewRegistryClient(puller)
result, err := bm.LatestBundle(ctx, "test", "1", "21", "")
assert.EqualError(t, err, "pulling package bundle: oops")
assert.Nil(t, result)
})
}
| 112 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: client.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
v1alpha1 "github.com/aws/eks-anywhere-packages/api/v1alpha1"
gomock "github.com/golang/mock/gomock"
v1 "k8s.io/api/core/v1"
client "sigs.k8s.io/controller-runtime/pkg/client"
)
// MockClient is a mock of Client interface.
type MockClient struct {
ctrl *gomock.Controller
recorder *MockClientMockRecorder
}
// MockClientMockRecorder is the mock recorder for MockClient.
type MockClientMockRecorder struct {
mock *MockClient
}
// NewMockClient creates a new mock instance.
func NewMockClient(ctrl *gomock.Controller) *MockClient {
mock := &MockClient{ctrl: ctrl}
mock.recorder = &MockClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockClient) EXPECT() *MockClientMockRecorder {
return m.recorder
}
// CreateBundle mocks base method.
func (m *MockClient) CreateBundle(ctx context.Context, bundle *v1alpha1.PackageBundle) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateBundle", ctx, bundle)
ret0, _ := ret[0].(error)
return ret0
}
// CreateBundle indicates an expected call of CreateBundle.
func (mr *MockClientMockRecorder) CreateBundle(ctx, bundle interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateBundle", reflect.TypeOf((*MockClient)(nil).CreateBundle), ctx, bundle)
}
// CreateClusterConfigMap mocks base method.
func (m *MockClient) CreateClusterConfigMap(ctx context.Context, clusterName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreateClusterConfigMap", ctx, clusterName)
ret0, _ := ret[0].(error)
return ret0
}
// CreateClusterConfigMap indicates an expected call of CreateClusterConfigMap.
func (mr *MockClientMockRecorder) CreateClusterConfigMap(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreateClusterConfigMap", reflect.TypeOf((*MockClient)(nil).CreateClusterConfigMap), ctx, clusterName)
}
// CreatePackage mocks base method.
func (m *MockClient) CreatePackage(ctx context.Context, pkg *v1alpha1.Package) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CreatePackage", ctx, pkg)
ret0, _ := ret[0].(error)
return ret0
}
// CreatePackage indicates an expected call of CreatePackage.
func (mr *MockClientMockRecorder) CreatePackage(ctx, pkg interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CreatePackage", reflect.TypeOf((*MockClient)(nil).CreatePackage), ctx, pkg)
}
// GetActiveBundle mocks base method.
func (m *MockClient) GetActiveBundle(ctx context.Context, clusterName string) (*v1alpha1.PackageBundle, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetActiveBundle", ctx, clusterName)
ret0, _ := ret[0].(*v1alpha1.PackageBundle)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetActiveBundle indicates an expected call of GetActiveBundle.
func (mr *MockClientMockRecorder) GetActiveBundle(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetActiveBundle", reflect.TypeOf((*MockClient)(nil).GetActiveBundle), ctx, clusterName)
}
// GetBundle mocks base method.
func (m *MockClient) GetBundle(ctx context.Context, name string) (*v1alpha1.PackageBundle, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetBundle", ctx, name)
ret0, _ := ret[0].(*v1alpha1.PackageBundle)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetBundle indicates an expected call of GetBundle.
func (mr *MockClientMockRecorder) GetBundle(ctx, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetBundle", reflect.TypeOf((*MockClient)(nil).GetBundle), ctx, name)
}
// GetBundleList mocks base method.
func (m *MockClient) GetBundleList(ctx context.Context) ([]v1alpha1.PackageBundle, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetBundleList", ctx)
ret0, _ := ret[0].([]v1alpha1.PackageBundle)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetBundleList indicates an expected call of GetBundleList.
func (mr *MockClientMockRecorder) GetBundleList(ctx interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetBundleList", reflect.TypeOf((*MockClient)(nil).GetBundleList), ctx)
}
// GetPackageBundleController mocks base method.
func (m *MockClient) GetPackageBundleController(ctx context.Context, clusterName string) (*v1alpha1.PackageBundleController, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetPackageBundleController", ctx, clusterName)
ret0, _ := ret[0].(*v1alpha1.PackageBundleController)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetPackageBundleController indicates an expected call of GetPackageBundleController.
func (mr *MockClientMockRecorder) GetPackageBundleController(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPackageBundleController", reflect.TypeOf((*MockClient)(nil).GetPackageBundleController), ctx, clusterName)
}
// GetPackageList mocks base method.
func (m *MockClient) GetPackageList(ctx context.Context, namespace string) (v1alpha1.PackageList, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetPackageList", ctx, namespace)
ret0, _ := ret[0].(v1alpha1.PackageList)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetPackageList indicates an expected call of GetPackageList.
func (mr *MockClientMockRecorder) GetPackageList(ctx, namespace interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetPackageList", reflect.TypeOf((*MockClient)(nil).GetPackageList), ctx, namespace)
}
// GetSecret mocks base method.
func (m *MockClient) GetSecret(ctx context.Context, name string) (*v1.Secret, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetSecret", ctx, name)
ret0, _ := ret[0].(*v1.Secret)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetSecret indicates an expected call of GetSecret.
func (mr *MockClientMockRecorder) GetSecret(ctx, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetSecret", reflect.TypeOf((*MockClient)(nil).GetSecret), ctx, name)
}
// Save mocks base method.
func (m *MockClient) Save(ctx context.Context, object client.Object) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Save", ctx, object)
ret0, _ := ret[0].(error)
return ret0
}
// Save indicates an expected call of Save.
func (mr *MockClientMockRecorder) Save(ctx, object interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Save", reflect.TypeOf((*MockClient)(nil).Save), ctx, object)
}
// SaveStatus mocks base method.
func (m *MockClient) SaveStatus(ctx context.Context, object client.Object) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "SaveStatus", ctx, object)
ret0, _ := ret[0].(error)
return ret0
}
// SaveStatus indicates an expected call of SaveStatus.
func (mr *MockClientMockRecorder) SaveStatus(ctx, object interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SaveStatus", reflect.TypeOf((*MockClient)(nil).SaveStatus), ctx, object)
}
| 199 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: manager.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
v1alpha1 "github.com/aws/eks-anywhere-packages/api/v1alpha1"
gomock "github.com/golang/mock/gomock"
)
// MockManager is a mock of Manager interface.
type MockManager struct {
ctrl *gomock.Controller
recorder *MockManagerMockRecorder
}
// MockManagerMockRecorder is the mock recorder for MockManager.
type MockManagerMockRecorder struct {
mock *MockManager
}
// NewMockManager creates a new mock instance.
func NewMockManager(ctrl *gomock.Controller) *MockManager {
mock := &MockManager{ctrl: ctrl}
mock.recorder = &MockManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockManager) EXPECT() *MockManagerMockRecorder {
return m.recorder
}
// ProcessBundle mocks base method.
func (m *MockManager) ProcessBundle(ctx context.Context, newBundle *v1alpha1.PackageBundle) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ProcessBundle", ctx, newBundle)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// ProcessBundle indicates an expected call of ProcessBundle.
func (mr *MockManagerMockRecorder) ProcessBundle(ctx, newBundle interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProcessBundle", reflect.TypeOf((*MockManager)(nil).ProcessBundle), ctx, newBundle)
}
// ProcessBundleController mocks base method.
func (m *MockManager) ProcessBundleController(ctx context.Context, pbc *v1alpha1.PackageBundleController) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "ProcessBundleController", ctx, pbc)
ret0, _ := ret[0].(error)
return ret0
}
// ProcessBundleController indicates an expected call of ProcessBundleController.
func (mr *MockManagerMockRecorder) ProcessBundleController(ctx, pbc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProcessBundleController", reflect.TypeOf((*MockManager)(nil).ProcessBundleController), ctx, pbc)
}
| 66 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: registry_client.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
v1alpha1 "github.com/aws/eks-anywhere-packages/api/v1alpha1"
gomock "github.com/golang/mock/gomock"
)
// MockRegistryClient is a mock of RegistryClient interface.
type MockRegistryClient struct {
ctrl *gomock.Controller
recorder *MockRegistryClientMockRecorder
}
// MockRegistryClientMockRecorder is the mock recorder for MockRegistryClient.
type MockRegistryClientMockRecorder struct {
mock *MockRegistryClient
}
// NewMockRegistryClient creates a new mock instance.
func NewMockRegistryClient(ctrl *gomock.Controller) *MockRegistryClient {
mock := &MockRegistryClient{ctrl: ctrl}
mock.recorder = &MockRegistryClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockRegistryClient) EXPECT() *MockRegistryClientMockRecorder {
return m.recorder
}
// DownloadBundle mocks base method.
func (m *MockRegistryClient) DownloadBundle(ctx context.Context, ref, clusterName string) (*v1alpha1.PackageBundle, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "DownloadBundle", ctx, ref, clusterName)
ret0, _ := ret[0].(*v1alpha1.PackageBundle)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// DownloadBundle indicates an expected call of DownloadBundle.
func (mr *MockRegistryClientMockRecorder) DownloadBundle(ctx, ref, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DownloadBundle", reflect.TypeOf((*MockRegistryClient)(nil).DownloadBundle), ctx, ref, clusterName)
}
// LatestBundle mocks base method.
func (m *MockRegistryClient) LatestBundle(ctx context.Context, baseRef, kubeMajor, kubeMinor, clusterName string) (*v1alpha1.PackageBundle, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "LatestBundle", ctx, baseRef, kubeMajor, kubeMinor, clusterName)
ret0, _ := ret[0].(*v1alpha1.PackageBundle)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// LatestBundle indicates an expected call of LatestBundle.
func (mr *MockRegistryClientMockRecorder) LatestBundle(ctx, baseRef, kubeMajor, kubeMinor, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "LatestBundle", reflect.TypeOf((*MockRegistryClient)(nil).LatestBundle), ctx, baseRef, kubeMajor, kubeMinor, clusterName)
}
| 67 |
eks-anywhere-packages | aws | Go | package config
import (
"strconv"
"time"
)
const (
DEVELOPMENT = "development"
HEAD = "HEAD"
EPOCH = "0"
)
var config Config
var version = DEVELOPMENT
var gitHash = HEAD
var buildTime = EPOCH
type Config struct {
BuildInfo BuildInfo
Env BuildInfo
}
type BuildInfo struct {
Version string
GitHash string
BuildTime time.Time
}
func init() {
config = GetConfig()
}
func GetGlobalConfig() Config {
return config
}
func GetConfig() Config {
btime, err := strconv.ParseInt(buildTime, 10, 64)
if err != nil {
btime = 0
}
return Config{
BuildInfo: BuildInfo{
Version: version,
GitHash: gitHash,
BuildTime: time.Unix(btime, 0),
},
}
}
| 53 |
eks-anywhere-packages | aws | Go | package csset
import (
"strings"
"sync"
)
// CSSet is a comma-separated set of strings.
type CSSet struct {
mu sync.Mutex
set map[string]struct{}
}
func NewCSSet(s string) *CSSet {
c := &CSSet{
set: make(map[string]struct{}),
}
if s == "" {
return c
}
for _, value := range strings.Split(s, ",") {
c.Add(value)
}
return c
}
func (c *CSSet) Add(value string) {
c.mu.Lock()
defer c.mu.Unlock()
c.set[value] = struct{}{}
}
func (c *CSSet) Del(value string) {
c.mu.Lock()
defer c.mu.Unlock()
delete(c.set, value)
}
func (c *CSSet) Has(value string) bool {
c.mu.Lock()
defer c.mu.Unlock()
_, found := c.set[value]
return found
}
func (c *CSSet) Size() int {
c.mu.Lock()
defer c.mu.Unlock()
return len(c.set)
}
func (c *CSSet) String() string {
out := []string{}
c.mu.Lock()
defer c.mu.Unlock()
for key := range c.set {
out = append(out, key)
}
return strings.Join(out, ",")
}
| 62 |
eks-anywhere-packages | aws | Go | package csset
import (
"strings"
"testing"
"github.com/stretchr/testify/assert"
)
func TestCSSetEmptyInit(t *testing.T) {
set := NewCSSet("")
assert.Equal(t, "", set.String())
}
func TestCSSetContentsInit(t *testing.T) {
set := NewCSSet("one,three,two")
n := struct{}{}
assert.ObjectsAreEqual(map[string]struct{}{
"one": n, "two": n, "three": n},
set.set)
}
func TestCSSetAdd(t *testing.T) {
set := NewCSSet("")
set.Add("one")
assert.Equal(t, "one", set.String())
}
func TestCSSetTwo(t *testing.T) {
set := NewCSSet("")
set.Add("one")
set.Add("two")
exp := [2]string{"one", "two"}
res := strings.Split(set.String(), ",")
assert.ElementsMatch(t, exp, res)
}
func TestCSSetDel(t *testing.T) {
set := NewCSSet("one,two")
set.Del("one")
assert.Equal(t, "two", set.String())
}
func TestCSSetHas(t *testing.T) {
set := NewCSSet("one,two")
assert.True(t, set.Has("one"))
assert.True(t, set.Has("two"))
assert.False(t, set.Has("three"))
}
func TestCSSetDelNotExists(t *testing.T) {
set := NewCSSet("one,two")
assert.NotPanics(t, func() { set.Del("three") })
}
func TestCSSetLenZero(t *testing.T) {
set := NewCSSet("")
assert.Zero(t, set.Size())
}
func TestCSSetLenTwo(t *testing.T) {
set := NewCSSet("one,two")
assert.Equal(t, 2, set.Size())
}
| 65 |
eks-anywhere-packages | aws | Go | package driver
import (
"context"
"errors"
"fmt"
"os"
"reflect"
"strings"
"github.com/go-logr/logr"
"helm.sh/helm/v3/pkg/action"
"helm.sh/helm/v3/pkg/chart"
"helm.sh/helm/v3/pkg/chart/loader"
"helm.sh/helm/v3/pkg/cli"
"helm.sh/helm/v3/pkg/registry"
"helm.sh/helm/v3/pkg/storage/driver"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
auth "github.com/aws/eks-anywhere-packages/pkg/authenticator"
packagesRegistry "github.com/aws/eks-anywhere-packages/pkg/registry"
)
const (
varHelmUpgradeMaxHistory = 2
)
// helmDriver implements PackageDriver to install packages from Helm charts.
type helmDriver struct {
cfg *action.Configuration
secretAuth auth.Authenticator
tcc auth.TargetClusterClient
log logr.Logger
settings *cli.EnvSettings
}
var _ PackageDriver = (*helmDriver)(nil)
func NewHelm(log logr.Logger, secretAuth auth.Authenticator, tcc auth.TargetClusterClient) *helmDriver {
return &helmDriver{
secretAuth: secretAuth,
tcc: tcc,
log: log,
}
}
func (d *helmDriver) Initialize(ctx context.Context, clusterName string) (err error) {
err = d.secretAuth.Initialize(clusterName)
if err != nil {
d.log.Info("failed to change target cluster for secrets")
}
err = d.tcc.Initialize(ctx, clusterName)
if err != nil {
return fmt.Errorf("initialiing target cluster %s client for helm driver: %w", clusterName, err)
}
d.settings = cli.New()
insecure := packagesRegistry.GetRegistryInsecure(clusterName)
caFile := packagesRegistry.GetClusterCertificateFileName(clusterName)
client, err := newRegistryClient("", "", caFile, insecure, d.settings)
if err != nil {
return fmt.Errorf("creating registry client for helm driver: %w", err)
}
d.cfg = &action.Configuration{RegistryClient: client}
err = d.cfg.Init(d.tcc, d.settings.Namespace(), os.Getenv("HELM_DRIVER"), helmLog(d.log))
if err != nil {
return fmt.Errorf("initializing helm driver: %w", err)
}
return nil
}
func (d *helmDriver) Install(ctx context.Context,
name string, namespace string, createNamespace bool, source api.PackageOCISource, values map[string]interface{},
) error {
var err error
install := action.NewInstall(d.cfg)
install.Version = source.Version
install.ReleaseName = name
install.CreateNamespace = createNamespace
helmChart, err := d.getChart(install, source)
if err != nil {
return fmt.Errorf("loading helm chart %s: %w", name, err)
}
// If no target namespace provided read chart values to find namespace
if namespace == "" {
if chartNS, ok := helmChart.Values["defaultNamespace"]; ok {
namespace = chartNS.(string)
} else {
// Fall back case of assuming its default
namespace = "default"
}
}
install.Namespace = namespace
// Update values with imagePullSecrets
// If no secret values we should still continue as it could be case of public registry or local registry
secretvals, err := d.secretAuth.GetSecretValues(ctx, namespace)
if err != nil {
secretvals = nil
// Continue as its possible that a private registry is being used here and thus no data necessary
}
for key, val := range secretvals {
values[key] = val
}
// Check if there exists a matching helm release.
get := action.NewGet(d.cfg)
_, err = get.Run(name)
if err != nil {
if errors.Is(err, driver.ErrReleaseNotFound) {
// Trigger configmap updates and namespace before trying to install charts
if err := d.secretAuth.AddToConfigMap(ctx, name, namespace); err != nil {
d.log.Info("failed to Update ConfigMap with installed namespace", "error", err)
}
if err := d.secretAuth.AddSecretToAllNamespace(ctx); err != nil {
d.log.Info("failed to Update Secret in all namespaces", "error", err)
}
err = d.createRelease(ctx, install, helmChart, values)
if err != nil {
err1 := d.secretAuth.DelFromConfigMap(ctx, name, namespace)
if err1 != nil {
d.log.Info("failed to remove namespace from configmap")
}
return err
}
// Failsafe in event namespace is created via the charts
if err := d.secretAuth.AddSecretToAllNamespace(ctx); err != nil {
d.log.Info("failed to Update Secret in all namespaces", "error", err)
}
return nil
}
return fmt.Errorf("getting helm release %s: %w", name, err)
}
err = d.upgradeRelease(ctx, name, helmChart, values)
if err != nil {
return fmt.Errorf("upgrading helm chart %s: %w", name, err)
}
// Update installed-namespaces on successful install
err = d.secretAuth.AddToConfigMap(ctx, name, namespace)
if err != nil {
d.log.Info("failed to Update ConfigMap with installed namespace", "error", err)
}
if err := d.secretAuth.AddSecretToAllNamespace(ctx); err != nil {
d.log.Info("failed to Update Secret in all namespaces", "error", err)
}
err = d.upgradeRelease(ctx, name, helmChart, values)
if err != nil {
return fmt.Errorf("upgrading helm chart %s: %w", name, err)
}
if err := d.secretAuth.AddSecretToAllNamespace(ctx); err != nil {
d.log.Info("failed to Update Secret in all namespaces", "error", err)
}
return nil
}
func (d *helmDriver) getChart(install *action.Install, source api.PackageOCISource) (*chart.Chart, error) {
url := source.GetChartUri()
chartPath, err := install.LocateChart(url, d.settings)
if err != nil {
return nil, fmt.Errorf("locating helm chart %s tag %s: %w", url, source.Digest, err)
}
return loader.Load(chartPath)
}
func (d *helmDriver) createRelease(ctx context.Context,
install *action.Install, helmChart *chart.Chart, values map[string]interface{},
) error {
_, err := install.RunWithContext(ctx, helmChart, values)
if err != nil {
return fmt.Errorf("installing helm chart %s: %w", install.ReleaseName, err)
}
return nil
}
// helmChartURLIsPrefixed detects if the given URL has an acceptable scheme
// prefix.
func helmChartURLIsPrefixed(url string) bool {
return strings.HasPrefix(url, "https://") ||
strings.HasPrefix(url, "http://") ||
strings.HasPrefix(url, "oci://")
}
// upgradeRelease instructs helm to upgrade a release.
func (d *helmDriver) upgradeRelease(ctx context.Context, name string,
helmChart *chart.Chart, values map[string]interface{},
) (err error) {
// upgrade unless changes in the values are detected. For POC, run helm
// every time and rely on its idempotency.
upgrade := action.NewUpgrade(d.cfg)
// Limit history saved as secret for resource limit
upgrade.MaxHistory = varHelmUpgradeMaxHistory
_, err = upgrade.RunWithContext(ctx, name, helmChart, values)
if err != nil {
return fmt.Errorf("upgrading helm release %s: %w", name, err)
}
return nil
}
func (d *helmDriver) Uninstall(ctx context.Context, name string) (err error) {
uninstall := action.NewUninstall(d.cfg)
rel, err := uninstall.Run(name)
if err != nil {
if errors.Is(err, driver.ErrReleaseNotFound) {
return nil
}
return fmt.Errorf("uninstalling helm chart %s: %w", name, err)
}
err = d.secretAuth.DelFromConfigMap(ctx, name, rel.Release.Namespace)
if err != nil {
d.log.Info("failed to remove namespace from configmap")
}
return nil
}
// helmLog wraps logr.Logger to make it compatible with helm's DebugLog.
func helmLog(log logr.Logger) action.DebugLog {
return func(template string, args ...interface{}) {
log.Info(fmt.Sprintf(template, args...))
}
}
func (d *helmDriver) IsConfigChanged(_ context.Context, name string, values map[string]interface{}) (bool, error) {
get := action.NewGet(d.cfg)
rel, err := get.Run(name)
if err != nil {
d.log.Info("Installation not found %q: %w", name, err)
return true, nil
}
// Check imagePullSecret not defined in config
if _, exist := values["imagePullSecrets"]; !exist {
// Check if imagePullSecrets was added by driver
if val, ok := rel.Config["imagePullSecrets"]; ok {
values["imagePullSecrets"] = val
}
}
return !reflect.DeepEqual(values, rel.Config), nil
}
func newRegistryClient(certFile, keyFile, caFile string, insecureSkipTLSverify bool, settings *cli.EnvSettings) (*registry.Client, error) {
if certFile != "" && keyFile != "" || caFile != "" || !insecureSkipTLSverify {
registryClient, err := newRegistryClientWithTLS(certFile, keyFile, caFile, insecureSkipTLSverify, settings)
if err != nil {
return nil, err
}
return registryClient, nil
}
registryClient, err := newDefaultRegistryClient(settings)
if err != nil {
return nil, err
}
return registryClient, nil
}
func newDefaultRegistryClient(settings *cli.EnvSettings) (*registry.Client, error) {
// Create a new registry client
registryClient, err := registry.NewClient(
registry.ClientOptDebug(settings.Debug),
registry.ClientOptEnableCache(false),
registry.ClientOptWriter(os.Stderr),
registry.ClientOptCredentialsFile(settings.RegistryConfig),
)
if err != nil {
return nil, err
}
return registryClient, nil
}
func newRegistryClientWithTLS(certFile, keyFile, caFile string, insecureSkipTLSverify bool, settings *cli.EnvSettings) (*registry.Client, error) {
// Create a new registry client
registryClient, err := registry.NewRegistryClientWithTLS(os.Stderr, certFile, keyFile, caFile, insecureSkipTLSverify,
settings.RegistryConfig, settings.Debug,
)
if err != nil {
return nil, err
}
return registryClient, nil
}
| 291 |
eks-anywhere-packages | aws | Go | package driver
import (
"context"
"fmt"
"testing"
"github.com/go-logr/logr"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"helm.sh/helm/v3/pkg/kube"
"helm.sh/helm/v3/pkg/release"
"github.com/aws/eks-anywhere-packages/pkg/authenticator/mocks"
)
var ctx context.Context = context.Background()
func TestHelmChartURLIsPrefixed(t *testing.T) {
t.Run("https yes", func(t *testing.T) {
t.Parallel()
assert.True(t, helmChartURLIsPrefixed("https://foo"))
})
t.Run("http yes", func(t *testing.T) {
t.Parallel()
assert.True(t, helmChartURLIsPrefixed("http://foo"))
})
t.Run("oci yes", func(t *testing.T) {
t.Parallel()
assert.True(t, helmChartURLIsPrefixed("oci://foo"))
})
t.Run("boo no", func(t *testing.T) {
t.Parallel()
assert.False(t, helmChartURLIsPrefixed("boo://foo"))
})
}
func TestHelmDriverInitialize(t *testing.T) {
t.Run("golden path", func(t *testing.T) {
t.Parallel()
helm := givenHelmDriver(t)
err := helm.Initialize(ctx, "billy")
assert.NoError(t, err)
})
}
func TestIsConfigChanged(t *testing.T) {
t.Run("returns an error when the resource isn't found", func(t *testing.T) {
t.Parallel()
values := map[string]interface{}{}
helm, err := givenInitializedHelmDriver(t)
require.NoError(t, err)
helm.cfg.KubeClient = newMockKube(fmt.Errorf("blah"))
changed, err := helm.IsConfigChanged(ctx, "name-does-not-exist", values)
assert.NoError(t, err)
assert.True(t, changed)
})
t.Run("golden path returning true", func(t *testing.T) {
t.Parallel()
const foo = 1
origValues := map[string]interface{}{"foo": foo, "bar": true}
newValues := shallowCopy(t, origValues)
newValues["foo"] = foo + 1
rel := &release.Release{Config: newValues}
helm, err := givenInitializedHelmDriver(t)
require.NoError(t, err)
helm.cfg.KubeClient = newMockKube(nil)
helm.cfg.Releases.Driver = newMockReleasesDriver(rel, nil)
changed, err := helm.IsConfigChanged(ctx, "name-does-not-matter", origValues)
assert.NoError(t, err)
assert.True(t, changed)
})
t.Run("golden path returning false", func(t *testing.T) {
t.Parallel()
origValues := map[string]interface{}{"foo": 1, "bar": true}
sameValues := shallowCopy(t, origValues)
rel := &release.Release{Config: sameValues}
helm, err := givenInitializedHelmDriver(t)
require.NoError(t, err)
helm.cfg.KubeClient = newMockKube(nil)
helm.cfg.Releases.Driver = newMockReleasesDriver(rel, nil)
changed, err := helm.IsConfigChanged(ctx, "name-does-not-matter", origValues)
assert.NoError(t, err)
assert.False(t, changed)
})
t.Run("golden path returning false with imagePullSecret added", func(t *testing.T) {
t.Parallel()
const foo = 1
origValues := map[string]interface{}{"foo": foo, "bar": true}
newValues := shallowCopy(t, origValues)
newValues["imagePullSecrets"] = "test"
rel := &release.Release{Config: newValues}
helm, err := givenInitializedHelmDriver(t)
assert.NoError(t, err)
helm.cfg.KubeClient = newMockKube(nil)
helm.cfg.Releases.Driver = newMockReleasesDriver(rel, nil)
changed, err := helm.IsConfigChanged(ctx, "name-does-not-matter", origValues)
assert.NoError(t, err)
assert.False(t, changed)
})
t.Run("golden path returning true with imagePullSecret via config", func(t *testing.T) {
t.Parallel()
const foo = 1
origValues := map[string]interface{}{"foo": foo, "bar": true}
newValues := shallowCopy(t, origValues)
origValues["imagePullSecrets"] = "test"
rel := &release.Release{Config: newValues}
helm, err := givenInitializedHelmDriver(t)
require.NoError(t, err)
helm.cfg.KubeClient = newMockKube(nil)
helm.cfg.Releases.Driver = newMockReleasesDriver(rel, nil)
changed, err := helm.IsConfigChanged(ctx, "name-does-not-matter", origValues)
assert.NoError(t, err)
assert.True(t, changed)
})
}
func givenHelmDriver(t *testing.T) *helmDriver {
mockSecretAuth := mocks.NewMockAuthenticator(gomock.NewController(t))
mockSecretAuth.EXPECT().Initialize("billy")
mockTargetClusterClient := mocks.NewMockTargetClusterClient(gomock.NewController(t))
mockTargetClusterClient.EXPECT().Initialize(ctx, "billy")
return NewHelm(logr.Discard(), mockSecretAuth, mockTargetClusterClient)
}
func givenInitializedHelmDriver(t *testing.T) (*helmDriver, error) {
helm := givenHelmDriver(t)
err := helm.Initialize(ctx, "billy")
return helm, err
}
type mockKube struct {
kube.Interface
err error
}
func newMockKube(err error) *mockKube {
return &mockKube{err: err}
}
func (k *mockKube) IsReachable() error {
if k.err != nil {
return fmt.Errorf("IsReachable test error %w", k.err)
}
return nil
}
type mockReleasesDriver struct {
release *release.Release
err error
}
func newMockReleasesDriver(release *release.Release, err error) *mockReleasesDriver {
return &mockReleasesDriver{
release: release,
err: err,
}
}
// generated via
// impl -dir $GOPATH/pkg/mod/helm.sh/helm/[email protected]/pkg/storage 'd *mockReleasesDriver' driver.Driver
func (d *mockReleasesDriver) Create(key string, rls *release.Release) error {
panic("not implemented") // TODO: Implement
}
func (d *mockReleasesDriver) Update(key string, rls *release.Release) error {
panic("not implemented") // TODO: Implement
}
func (d *mockReleasesDriver) Delete(key string) (*release.Release, error) {
panic("not implemented") // TODO: Implement
}
func (d *mockReleasesDriver) Get(key string) (*release.Release, error) {
if d.err != nil {
return nil, d.err
}
return d.release, nil
}
func (d *mockReleasesDriver) List(filter func(*release.Release) bool) ([]*release.Release, error) {
panic("not implemented") // TODO: Implement
}
func (d *mockReleasesDriver) Query(labels map[string]string) ([]*release.Release, error) {
if d.err != nil {
return nil, d.err
}
return []*release.Release{d.release}, nil
}
func (d *mockReleasesDriver) Name() string {
panic("not implemented") // TODO: Implement
}
func shallowCopy(t *testing.T, src map[string]interface{}) map[string]interface{} {
t.Helper()
dst := make(map[string]interface{}, len(src))
for key, value := range src {
dst[key] = value
}
return dst
}
| 231 |
eks-anywhere-packages | aws | Go | package driver
import (
"context"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
)
//go:generate mockgen -source packagedriver.go -destination=mocks/packagedriver.go -package=mocks PackageDriver
// PackageDriver is an interface for converting a CRD to a series of Kubernetes
// objects.
//
// Its first implementation will be Helm, but the interface is used to enhance
// and simplify testing as well as abstract the details of Helm.
type PackageDriver interface {
// Initialize the package driver
Initialize(ctx context.Context, clusterName string) error
// Install or upgrade an package.
Install(ctx context.Context, name string, namespace string, createNamespace bool, source api.PackageOCISource, values map[string]interface{}) error
// Uninstall an package.
Uninstall(ctx context.Context, name string) error
// IsConfigChanged indicates that the values passed differ from
// those currently running.
IsConfigChanged(ctx context.Context, name string,
values map[string]interface{}) (bool, error)
}
| 31 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: packagedriver.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
v1alpha1 "github.com/aws/eks-anywhere-packages/api/v1alpha1"
gomock "github.com/golang/mock/gomock"
)
// MockPackageDriver is a mock of PackageDriver interface.
type MockPackageDriver struct {
ctrl *gomock.Controller
recorder *MockPackageDriverMockRecorder
}
// MockPackageDriverMockRecorder is the mock recorder for MockPackageDriver.
type MockPackageDriverMockRecorder struct {
mock *MockPackageDriver
}
// NewMockPackageDriver creates a new mock instance.
func NewMockPackageDriver(ctrl *gomock.Controller) *MockPackageDriver {
mock := &MockPackageDriver{ctrl: ctrl}
mock.recorder = &MockPackageDriverMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockPackageDriver) EXPECT() *MockPackageDriverMockRecorder {
return m.recorder
}
// Initialize mocks base method.
func (m *MockPackageDriver) Initialize(ctx context.Context, clusterName string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Initialize", ctx, clusterName)
ret0, _ := ret[0].(error)
return ret0
}
// Initialize indicates an expected call of Initialize.
func (mr *MockPackageDriverMockRecorder) Initialize(ctx, clusterName interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Initialize", reflect.TypeOf((*MockPackageDriver)(nil).Initialize), ctx, clusterName)
}
// Install mocks base method.
func (m *MockPackageDriver) Install(ctx context.Context, name, namespace string, createNamespace bool, source v1alpha1.PackageOCISource, values map[string]interface{}) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Install", ctx, name, namespace, createNamespace, source, values)
ret0, _ := ret[0].(error)
return ret0
}
// Install indicates an expected call of Install.
func (mr *MockPackageDriverMockRecorder) Install(ctx, name, namespace, createNamespace, source, values interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Install", reflect.TypeOf((*MockPackageDriver)(nil).Install), ctx, name, namespace, createNamespace, source, values)
}
// IsConfigChanged mocks base method.
func (m *MockPackageDriver) IsConfigChanged(ctx context.Context, name string, values map[string]interface{}) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "IsConfigChanged", ctx, name, values)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// IsConfigChanged indicates an expected call of IsConfigChanged.
func (mr *MockPackageDriverMockRecorder) IsConfigChanged(ctx, name, values interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsConfigChanged", reflect.TypeOf((*MockPackageDriver)(nil).IsConfigChanged), ctx, name, values)
}
// Uninstall mocks base method.
func (m *MockPackageDriver) Uninstall(ctx context.Context, name string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Uninstall", ctx, name)
ret0, _ := ret[0].(error)
return ret0
}
// Uninstall indicates an expected call of Uninstall.
func (mr *MockPackageDriverMockRecorder) Uninstall(ctx, name interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Uninstall", reflect.TypeOf((*MockPackageDriver)(nil).Uninstall), ctx, name)
}
| 94 |
eks-anywhere-packages | aws | Go | package file
import (
"bytes"
"fmt"
"os"
"sigs.k8s.io/yaml"
)
const (
yamlSeparator = "\n---\n"
)
// KindAccessor exposes the Kind field for Cluster type.
//
// The FileReader will compare the Kind field (accessed via MetaKind()) with the
// result of ExpectedKind() to ensure that the data we unmarshaled was meant for
// a struct of the correct type. That is, it prevents us from unmarshaling bytes
// meant for a Foo struct into a Bar struct.
type KindAccessor interface {
// MetaKind is the kind actually read when unmarshaling from a file.
MetaKind() string
// ExpectedKind is the kind we expect to read while unmarshaling.
ExpectedKind() string
}
type FileReader struct {
fileName string
clusterConfigs map[string][]byte
}
func NewFileReader(fileName string) *FileReader {
return &FileReader{
fileName: fileName,
clusterConfigs: map[string][]byte{},
}
}
// sliceYAML returns a slice of YAML documents from a file.
func (reader *FileReader) sliceYAML() ([][]byte, error) {
content, err := os.ReadFile(reader.fileName)
if err != nil {
return nil, err
}
return bytes.Split(content, []byte(yamlSeparator)), nil
}
func (reader *FileReader) Initialize(clusterConfig KindAccessor) error {
yamls, err := reader.sliceYAML()
if err != nil {
return fmt.Errorf("reading <%s>: %v", reader.fileName, err)
}
for _, config := range yamls {
if err = yaml.Unmarshal(config, clusterConfig); err != nil {
return fmt.Errorf("error parsing <%s>:\n%s", reader.fileName, config)
}
reader.clusterConfigs[clusterConfig.MetaKind()] = config
}
return nil
}
func (reader *FileReader) Parse(clusterConfig KindAccessor) error {
if val, ok := reader.clusterConfigs[clusterConfig.ExpectedKind()]; ok {
return ParseByteSlice(val, clusterConfig)
}
return fmt.Errorf("could not find <%s> in cluster configuration %s", clusterConfig.ExpectedKind(), reader.fileName)
}
func ParseByteSlice(data []byte, clusterConfig KindAccessor) error {
return yaml.UnmarshalStrict(data, clusterConfig)
}
| 75 |
eks-anywhere-packages | aws | Go | package file
import (
"testing"
"github.com/stretchr/testify/assert"
)
type testObject struct {
Kind string `json:"kind"`
Foo int `json:"foo"`
}
func (o *testObject) ExpectedKind() string {
return "testObject"
}
func (o *testObject) MetaKind() string {
return o.Kind
}
func TestFileReaderInitializeEnoent(t *testing.T) {
sut := NewFileReader("../../api/testdata/enoent.yaml")
actual := sut.Initialize(&testObject{})
assert.EqualError(t, actual, "reading <../../api/testdata/enoent.yaml>: open ../../api/testdata/enoent.yaml: no such file or directory")
}
func TestFileReaderInitializeBogus(t *testing.T) {
sut := NewFileReader("../../api/testdata/bogus.yaml")
actual := sut.Initialize(&testObject{})
assert.EqualError(t, actual, "error parsing <../../api/testdata/bogus.yaml>:\nbogus\n")
}
func TestFileReaderInitializeGood(t *testing.T) {
sut := NewFileReader("../../api/testdata/multiple.yaml")
actual := sut.Initialize(&testObject{})
assert.Nil(t, actual)
}
func TestFileReaderParseMissing(t *testing.T) {
config := testObject{}
sut := NewFileReader("../../api/testdata/missing.yaml")
initError := sut.Initialize(&config)
assert.Nil(t, initError)
actual := sut.Parse(&config)
assert.EqualError(t, actual, "could not find <testObject> in cluster configuration ../../api/testdata/missing.yaml")
}
func TestFileReaderParseGood(t *testing.T) {
config := &testObject{}
sut := NewFileReader("../../api/testdata/multiple.yaml")
initError := sut.Initialize(config)
assert.Nil(t, initError)
actual := sut.Parse(config)
assert.Nil(t, actual)
}
| 67 |
eks-anywhere-packages | aws | Go | package packages
import (
"context"
"fmt"
"os"
"strings"
"sync"
"time"
"github.com/go-logr/logr"
"sigs.k8s.io/yaml"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/bundle"
"github.com/aws/eks-anywhere-packages/pkg/driver"
"github.com/aws/eks-anywhere-packages/pkg/utils"
)
const (
retryNever = time.Duration(0)
retryNow = time.Duration(1)
retrySoon = time.Duration(2) * time.Second
retryShort = time.Duration(30) * time.Second
retryLong = time.Duration(60) * time.Second
retryVeryLong = time.Duration(180) * time.Second
sourceRegistry = "sourceRegistry"
)
type ManagerContext struct {
Ctx context.Context
Package api.Package
PackageDriver driver.PackageDriver
Source api.PackageOCISource
PBC api.PackageBundleController
Version api.SourceVersion
RequeueAfter time.Duration
Log logr.Logger
Bundle *api.PackageBundle
ManagerClient bundle.Client
}
func NewManagerContext(ctx context.Context, log logr.Logger, packageDriver driver.PackageDriver) *ManagerContext {
return &ManagerContext{
Ctx: ctx,
Log: log,
PackageDriver: packageDriver,
}
}
func (mc *ManagerContext) SetUninstalling(namespace string, name string) {
mc.Package.Namespace = namespace
mc.Package.Name = name
mc.Package.Status.State = api.StateUninstalling
}
func (mc *ManagerContext) getImageRegistry(values map[string]interface{}) string {
if val, ok := values[sourceRegistry]; ok {
if val != "" {
return val.(string)
}
}
if mc.PBC.Spec.PrivateRegistry != "" {
return mc.PBC.Spec.PrivateRegistry
}
return mc.PBC.GetDefaultImageRegistry()
}
func processInitializing(mc *ManagerContext) bool {
mc.Log.Info("New installation", "name", mc.Package.Name)
mc.Package.Status.Source = mc.Source
mc.Package.Status.State = api.StateInstallingDependencies
mc.RequeueAfter = retryNow
mc.Package.Spec.DeepCopyInto(&mc.Package.Status.Spec)
return true
}
func processUpdating(mc *ManagerContext) bool {
mc.Log.Info("Updating package ", "name", mc.Package.Name)
mc.Package.Status.State = api.StateInstallingDependencies
mc.RequeueAfter = retryNow
return true
}
func processInstallingDependencies(mc *ManagerContext) bool {
mc.Log.Info("Installing dependencies", "chart", mc.Source)
dependencies, err := mc.Bundle.GetDependencies(mc.Version)
if err != nil {
mc.Package.Status.Detail = fmt.Sprintf(
"invalid package bundle. (%s@%s bundle: %s)",
mc.Package.Name,
mc.Version,
mc.Bundle.Name,
)
mc.Log.Info(mc.Package.Status.Detail)
mc.RequeueAfter = retryLong
return true
}
pkgs, err := mc.ManagerClient.GetPackageList(mc.Ctx, mc.Package.Namespace)
if err != nil {
mc.RequeueAfter = retryShort
mc.Package.Status.Detail = err.Error()
return true
}
pkgsNotReady := []api.Package{}
for _, dep := range dependencies {
var pkg *api.Package
for i := range pkgs.Items {
items := pkgs.Items
if items[i].Spec.PackageName == dep.Name {
pkg = &items[i]
}
}
if pkg != nil {
if pkg.Status.State != api.StateInstalled {
pkgsNotReady = append(pkgsNotReady, *pkg)
}
} else {
p := api.NewPackage(dep.Name, dep.Name, mc.Package.Namespace, mc.Package.Spec.Config)
p.Spec.TargetNamespace = mc.Package.Spec.TargetNamespace
pkgsNotReady = append(pkgsNotReady, p)
err := mc.ManagerClient.CreatePackage(mc.Ctx, &p)
if err != nil {
mc.Log.Error(err, "creating dependency package")
}
}
}
if len(pkgsNotReady) > 0 {
depsStr := utils.Map(pkgsNotReady, func(pkg api.Package) string { return pkg.Spec.PackageName })
mc.Package.Status.Detail = "Waiting for dependencies: " + strings.Join(depsStr, ", ")
mc.RequeueAfter = retrySoon
return true
}
mc.Package.Status.State = api.StateInstalling
mc.Package.Status.Detail = ""
return true
}
func processInstalling(mc *ManagerContext) bool {
mc.Package.Status.Source = mc.Source
mc.Log.Info("installing/updating", "chart", mc.Source)
var err error
var values map[string]interface{}
if values, err = mc.Package.GetValues(); err != nil {
mc.Package.Status.Detail = err.Error()
mc.Log.Error(err, "Install failed")
return true
}
values[sourceRegistry] = mc.getImageRegistry(values)
if mc.Source.Registry == "" {
mc.Source.Registry = mc.PBC.GetDefaultRegistry()
}
if err := mc.PackageDriver.Initialize(mc.Ctx, mc.Package.GetClusterName()); err != nil {
mc.Package.Status.Detail = err.Error()
return true
}
createNamespace := mc.PBC.Spec.CreateNamespace
if err := mc.PackageDriver.Install(mc.Ctx, mc.Package.Name, mc.Package.Spec.TargetNamespace, createNamespace, mc.Source, values); err != nil {
mc.Package.Status.Detail = err.Error()
mc.Log.Error(err, "Install failed")
return true
}
mc.Log.Info("Installed", "name", mc.Package.Name, "chart", mc.Package.Status.Source)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.CurrentVersion = mc.Source.Version
mc.Package.Status.Detail = ""
if len(mc.Package.GetClusterName()) == 0 {
mc.Package.Status.Detail = "Deprecated package namespace. Move to eksa-packages-" + os.Getenv("CLUSTER_NAME")
}
mc.Package.Spec.DeepCopyInto(&mc.Package.Status.Spec)
return true
}
func processInstalled(mc *ManagerContext) bool {
if mc.Package.Status.Source != mc.Source {
mc.Package.Status.Source = mc.Source
mc.Package.Status.State = api.StateUpdating
mc.RequeueAfter = retryShort
return true
}
var err error
newValues := make(map[string]interface{})
err = yaml.Unmarshal([]byte(mc.Package.Spec.Config), &newValues)
if err != nil {
mc.Log.Error(err, "unmarshaling current package configuration")
mc.Package.Status.Detail = err.Error()
mc.RequeueAfter = retryShort
return true
}
if err := mc.PackageDriver.Initialize(mc.Ctx, mc.Package.GetClusterName()); err != nil {
mc.Package.Status.Detail = err.Error()
mc.Log.Error(err, "Initialization failed")
return true
}
newValues[sourceRegistry] = mc.getImageRegistry(newValues)
needs, err := mc.PackageDriver.IsConfigChanged(mc.Ctx, mc.Package.Name, newValues)
if err != nil {
mc.Log.Error(err, "checking necessity of reconfiguration")
mc.Package.Status.Detail = err.Error()
mc.RequeueAfter = retryLong
return true
}
if needs {
mc.Log.Info("configuration change detected, upgrading")
mc.Package.Status.State = api.StateUpdating
mc.RequeueAfter = retryShort
mc.Package.Spec.DeepCopyInto(&mc.Package.Status.Spec)
return true
}
mc.RequeueAfter = retryVeryLong
return false
}
func processUninstalling(mc *ManagerContext) bool {
if err := mc.PackageDriver.Initialize(mc.Ctx, mc.Package.GetClusterName()); err != nil {
mc.Package.Status.Detail = err.Error()
mc.Log.Error(err, "Initialization failed")
return false
}
if err := mc.PackageDriver.Uninstall(mc.Ctx, mc.Package.Name); err != nil {
mc.Package.Status.Detail = err.Error()
mc.Log.Error(err, "Uninstall failed")
return false
}
mc.Log.Info("Uninstalled", "name", mc.Package.Name)
mc.Package.Status.Detail = ""
mc.RequeueAfter = retryNever
return false
}
func processUnknown(mc *ManagerContext) bool {
mc.Log.Info("Unknown state", "name", mc.Package.Name)
mc.Package.Status.Detail = "Unknown state: " + string(mc.Package.Status.State)
mc.RequeueAfter = retryNever
mc.Package.Spec.DeepCopyInto(&mc.Package.Status.Spec)
return true
}
func processDone(mc *ManagerContext) bool {
mc.RequeueAfter = retryNever
return false
}
//go:generate mockgen -source manager.go -destination=mocks/manager.go -package=mocks Manager
type Manager interface {
// Process package events returns true if status update
Process(mc *ManagerContext) bool
}
type manager struct {
packageStates map[api.StateEnum]func(*ManagerContext) bool
}
var (
instance Manager
once sync.Once
)
func NewManager() Manager {
once.Do(func() {
instance = &(manager{
packageStates: map[api.StateEnum]func(*ManagerContext) bool{
api.StateInitializing: processInitializing,
api.StateInstalling: processInstalling,
api.StateInstallingDependencies: processInstallingDependencies,
api.StateInstalled: processInstalled,
api.StateUpdating: processUpdating,
api.StateUninstalling: processUninstalling,
api.StateUnknown: processDone,
},
})
})
return instance
}
func (m manager) getState(stateName api.StateEnum) func(*ManagerContext) bool {
if stateName == "" {
stateName = api.StateInitializing
}
if val, ok := m.packageStates[stateName]; ok {
return val
}
return processUnknown
}
func (m manager) Process(mc *ManagerContext) bool {
mc.RequeueAfter = retryLong
if !mc.Package.IsValidNamespace() {
mc.Package.Status.Detail = "Packages namespaces must start with: " + api.PackageNamespace
mc.RequeueAfter = retryNever
if mc.Package.Status.State == api.StateUnknown {
return false
}
mc.Package.Status.State = api.StateUnknown
return true
}
stateFunc := m.getState(mc.Package.Status.State)
result := stateFunc(mc)
if result {
mc.Log.Info(
"Updating",
"namespace",
mc.Package.Namespace,
"name",
mc.Package.Name,
"state",
mc.Package.Status.State,
"chart",
mc.Package.Status.Source,
)
}
return result
}
| 322 |
eks-anywhere-packages | aws | Go | package packages
import (
"context"
"errors"
"fmt"
"testing"
"time"
"github.com/go-logr/logr"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
api "github.com/aws/eks-anywhere-packages/api/v1alpha1"
cMock "github.com/aws/eks-anywhere-packages/controllers/mocks"
"github.com/aws/eks-anywhere-packages/pkg/bundle"
"github.com/aws/eks-anywhere-packages/pkg/driver/mocks"
)
const packageName = "packageName"
const packageInstance = "packageInstance"
const packageBundleName = "testPackageBundle"
const clusterName = "clusterName"
const originalConfiguration = `
make: willys
models:
mb: "41"
cj2a:
year: "45"
`
const newConfiguration = `
make: willys
models:
mc: "49"
cj3a:
year: "49"
`
type PackageOCISource = api.PackageOCISource
var expectedEmptySource = PackageOCISource{
Registry: "",
Repository: "",
Digest: "",
}
var expectedSource = PackageOCISource{
Registry: "public.ecr.aws/l0g8r8j6/",
Repository: "hello-eks-anywhere",
Digest: "sha256:f2ca1bb6c7e907d06dafe4687e579fce76b37e4e93b7605022da52e6ccc26fd2",
}
var expectedUpdate = PackageOCISource{
Registry: "public.ecr.aws/l0g8r8j6/",
Repository: "hello-eks-anywhere",
Digest: "sha256:deadbeefc7e907d06dafe4687e579fce76b37e4e93b7605022da52e6ccc26fd2",
}
func givenPackage() api.Package {
return api.Package{
TypeMeta: metav1.TypeMeta{
Kind: "Package",
},
ObjectMeta: metav1.ObjectMeta{
Name: packageInstance,
Namespace: "eksa-packages-" + clusterName,
},
Spec: api.PackageSpec{
PackageName: packageName,
Config: originalConfiguration,
},
}
}
func givenBundle() *api.PackageBundle {
return &api.PackageBundle{
TypeMeta: metav1.TypeMeta{
Kind: "PackageBundle",
},
ObjectMeta: metav1.ObjectMeta{
Name: packageBundleName,
Namespace: "eksa-packages-" + clusterName,
},
Spec: api.PackageBundleSpec{
Packages: []api.BundlePackage{
{
Name: packageName,
Source: api.BundlePackageSource{
Registry: "public.ecr.aws/j0a1m4z9/",
Repository: "hello-eks-anywhere",
Versions: []api.SourceVersion{
{
Name: "test",
Digest: "sha256:deadbeefc7e907d06dafe4687e579fce76b37e4e93b7605022da52e6ccc26fd2",
Dependencies: []string{
"test-dep",
},
},
},
},
},
{
Name: "test-dep",
Source: api.BundlePackageSource{
Registry: "public.ecr.aws/j0a1m4z9/",
Repository: "test-dep",
Versions: []api.SourceVersion{
{
Name: "test-dep-name",
Digest: "sha256:deadbeefc7e907d06dafe4687e579fce76b37e4e93b7605022da52e6ccc26fd2",
},
},
},
},
},
},
}
}
func givenMockClient(t *testing.T) *cMock.MockClient {
gomockController := gomock.NewController(t)
return cMock.NewMockClient(gomockController)
}
func givenMockDriver(t *testing.T) *mocks.MockPackageDriver {
gomockController := gomock.NewController(t)
return mocks.NewMockPackageDriver(gomockController)
}
func givenMocksWithClient(t *testing.T) (*ManagerContext, *cMock.MockClient) {
mc, _ := givenMocks(t)
mockClient := givenMockClient(t)
managerClient := bundle.NewManagerClient(mockClient)
mc.ManagerClient = managerClient
return mc, mockClient
}
func givenMocks(t *testing.T) (*ManagerContext, *mocks.MockPackageDriver) {
pkg := givenPackage()
mockDriver := givenMockDriver(t)
return &ManagerContext{
Ctx: context.Background(),
Package: pkg,
PackageDriver: mockDriver,
Source: expectedSource,
Bundle: givenBundle(),
PBC: api.PackageBundleController{
Spec: api.PackageBundleControllerSpec{
PrivateRegistry: "privateRegistry",
},
},
RequeueAfter: time.Duration(100),
Log: logr.Discard(),
}, mockDriver
}
func thenManagerContext(t *testing.T, mc *ManagerContext, expectedState api.StateEnum, expectedSource PackageOCISource, expectedRequeue time.Duration, expectedDetail string) {
assert.Equal(t, expectedState, mc.Package.Status.State)
assert.Equal(t, expectedSource, mc.Package.Status.Source)
assert.Equal(t, expectedRequeue, mc.RequeueAfter)
assert.Equal(t, expectedDetail, mc.Package.Status.Detail)
}
func TestManagerContext_SetUninstalling(t *testing.T) {
sut, _ := givenMocks(t)
expectedName := "billy"
expectedState := api.StateUninstalling
sut.SetUninstalling(api.PackageNamespace+"-"+clusterName, expectedName)
assert.Equal(t, expectedName, sut.Package.Name)
assert.Equal(t, expectedState, sut.Package.Status.State)
}
func TestManagerContext_getRegistry(t *testing.T) {
t.Run("registry from values", func(t *testing.T) {
sut, _ := givenMocks(t)
values := make(map[string]interface{})
values["sourceRegistry"] = "valuesRegistry"
assert.Equal(t, "valuesRegistry", sut.getImageRegistry(values))
})
t.Run("registry from privateRegistry", func(t *testing.T) {
sut, _ := givenMocks(t)
values := make(map[string]interface{})
assert.Equal(t, "privateRegistry", sut.getImageRegistry(values))
})
t.Run("registry from default gated registry", func(t *testing.T) {
sut, _ := givenMocks(t)
values := make(map[string]interface{})
sut.PBC.Spec.PrivateRegistry = ""
sut.Source.Registry = ""
assert.Equal(t, "783794618700.dkr.ecr.us-west-2.amazonaws.com", sut.getImageRegistry(values))
})
}
func TestNewManager(t *testing.T) {
expectedManager := NewManager()
actualManager := NewManager()
assert.Equal(t, expectedManager, actualManager)
}
func TestManagerLifecycle(t *testing.T) {
sut := NewManager()
t.Run("New package added with no state initializing", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = ""
expectedRequeue := time.Duration(1)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstallingDependencies, expectedSource, expectedRequeue, "")
})
t.Run("New package added with state initializing", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = api.StateInitializing
expectedRequeue := time.Duration(1)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstallingDependencies, expectedSource, expectedRequeue, "")
})
t.Run("installing with dependency causes dependency package to be created", func(t *testing.T) {
mc, mockClient := givenMocksWithClient(t)
mc.Package.Status.State = api.StateInstallingDependencies
mc.Version = mc.Bundle.Spec.Packages[0].Source.Versions[0]
mockClient.EXPECT().List(mc.Ctx, gomock.AssignableToTypeOf(&api.PackageList{}), gomock.Eq(client.InNamespace(mc.Package.Namespace))).SetArg(1, api.PackageList{})
expectedDepPkg := api.NewPackage("test-dep", "test-dep", mc.Package.Namespace, mc.Package.Spec.Config)
mockClient.EXPECT().Create(mc.Ctx, gomock.Eq(&expectedDepPkg)).Return(nil)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstallingDependencies, api.PackageOCISource{}, retrySoon, "Waiting for dependencies: test-dep")
})
t.Run("installing succeeds if dependencies are installed", func(t *testing.T) {
mc, mockClient := givenMocksWithClient(t)
mc.Package.Status.State = api.StateInstallingDependencies
mc.Version = mc.Bundle.Spec.Packages[0].Source.Versions[0]
installedPkg := api.NewPackage("test-dep", "test-dep", mc.Package.Namespace, mc.Package.Spec.Config)
installedPkg.Status.State = api.StateInstalled
mockClient.EXPECT().List(mc.Ctx, gomock.AssignableToTypeOf(&api.PackageList{}), gomock.Eq(client.InNamespace(mc.Package.Namespace))).SetArg(1, api.PackageList{
Items: []api.Package{
installedPkg,
},
})
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalling, api.PackageOCISource{}, retryLong, "")
})
t.Run("installing dependencies fails if the bundle is wrong", func(t *testing.T) {
mc, _ := givenMocksWithClient(t)
mc.Package.Status.State = api.StateInstallingDependencies
mc.Version = mc.Bundle.Spec.Packages[0].Source.Versions[0]
mc.Version.Dependencies = []string{"bad-dep"}
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstallingDependencies, api.PackageOCISource{}, retryLong, "invalid package bundle. (packageInstance@{test sha256:deadbeefc7e907d06dafe4687e579fce76b37e4e93b7605022da52e6ccc26fd2 [] [bad-dep]} bundle: testPackageBundle)")
})
t.Run("installing dependencies fails if the client fails", func(t *testing.T) {
mc, mockClient := givenMocksWithClient(t)
mc.Package.Status.State = api.StateInstallingDependencies
mc.Version = mc.Bundle.Spec.Packages[0].Source.Versions[0]
mockClient.EXPECT().List(mc.Ctx, gomock.AssignableToTypeOf(&api.PackageList{}), gomock.Eq(client.InNamespace(mc.Package.Namespace))).SetArg(1, api.PackageList{}).Return(errors.New("Failed!"))
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstallingDependencies, api.PackageOCISource{}, retryShort, "Failed!")
})
t.Run("installing waits if dependencies are installing and clears the Details field once installing", func(t *testing.T) {
mc, mockClient := givenMocksWithClient(t)
mc.Package.Status.State = api.StateInstallingDependencies
mc.Version = mc.Bundle.Spec.Packages[0].Source.Versions[0]
installedPkg := api.NewPackage("test-dep", "test-dep", mc.Package.Namespace, mc.Package.Spec.Config)
installedPkg.Status.State = api.StateInstalling
mockClient.EXPECT().List(mc.Ctx, gomock.AssignableToTypeOf(&api.PackageList{}), gomock.Eq(client.InNamespace(mc.Package.Namespace))).SetArg(1, api.PackageList{
Items: []api.Package{
installedPkg,
},
})
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstallingDependencies, api.PackageOCISource{}, retrySoon, "Waiting for dependencies: test-dep")
installedPkg.Status.State = api.StateInstalled
mockClient.EXPECT().List(mc.Ctx, gomock.AssignableToTypeOf(&api.PackageList{}), gomock.Eq(client.InNamespace(mc.Package.Namespace))).SetArg(1, api.PackageList{
Items: []api.Package{
installedPkg,
},
})
result = sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalling, api.PackageOCISource{}, retryLong, "")
})
t.Run("installing installs", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalling
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().Install(mc.Ctx, mc.Package.Name, mc.Package.Spec.TargetNamespace, false, mc.Source, gomock.Any()).Return(nil)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 60*time.Second, "")
})
t.Run("installing in deprecated namespace", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalling
mc.Package.Namespace = "eksa-packages"
t.Setenv("CLUSTER_NAME", "franky")
mockDriver.EXPECT().Initialize(mc.Ctx, "").Return(nil)
mockDriver.EXPECT().Install(mc.Ctx, mc.Package.Name, mc.Package.Spec.TargetNamespace, false, mc.Source, gomock.Any()).Return(nil)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 60*time.Second, "Deprecated package namespace. Move to eksa-packages-franky")
})
t.Run("installing with namespace creation enabled creates the namespace", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.PBC.Spec.CreateNamespace = true
mc.Package.Status.State = api.StateInstalling
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().Install(mc.Ctx, mc.Package.Name, mc.Package.Spec.TargetNamespace, true, mc.Source, gomock.Any()).Return(nil)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 60*time.Second, "")
})
t.Run("installing initialize fails", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalling
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(fmt.Errorf("boom"))
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalling, expectedSource, 60*time.Second, "boom")
})
t.Run("installing install fails", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalling
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().Install(mc.Ctx, mc.Package.Name, mc.Package.Spec.TargetNamespace, false, mc.Source, gomock.Any()).Return(fmt.Errorf("boom"))
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalling, expectedSource, 60*time.Second, "boom")
})
t.Run("installed upgrade triggered", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.Source = expectedSource
mc.Source = expectedUpdate
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateUpdating, expectedUpdate, 30*time.Second, "")
})
t.Run("installed configuration update", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.Source = expectedSource
mc.Source = expectedSource
mc.Package.Spec.Config = newConfiguration
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().IsConfigChanged(mc.Ctx, mc.Package.Name, gomock.Any()).Return(true, nil)
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateUpdating, expectedSource, 30*time.Second, "")
})
t.Run("installed no configuration change", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.Source = expectedSource
mc.Source = expectedSource
mc.Package.Spec.Config = originalConfiguration
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().IsConfigChanged(mc.Ctx, mc.Package.Name, gomock.Any()).Return(false, nil)
result := sut.Process(mc)
assert.False(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 180*time.Second, "")
})
t.Run("installed initialize error", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.Source = expectedSource
mc.Source = expectedSource
mc.Package.Spec.Config = newConfiguration
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(fmt.Errorf("boom"))
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 60*time.Second, "boom")
})
t.Run("installed IsConfigChanged error", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.Source = expectedSource
mc.Source = expectedSource
mc.Package.Spec.Config = newConfiguration
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().IsConfigChanged(mc.Ctx, mc.Package.Name, gomock.Any()).Return(true, fmt.Errorf("boom"))
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 60*time.Second, "boom")
})
t.Run("installed configuration parse error", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = api.StateInstalled
mc.Package.Status.Source = expectedSource
mc.Source = expectedSource
mc.Package.Spec.Config = "bogus configuration ---- what ever"
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateInstalled, expectedSource, 30*time.Second, "error unmarshaling JSON: while decoding JSON: json: cannot unmarshal string into Go value of type map[string]interface {}")
})
t.Run("Uninstalling works", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.SetUninstalling(api.PackageNamespace+"-"+clusterName, clusterName)
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().Uninstall(mc.Ctx, clusterName).Return(nil)
result := sut.Process(mc)
assert.False(t, result)
thenManagerContext(t, mc, api.StateUninstalling, expectedEmptySource, time.Duration(0), "")
})
t.Run("Uninstalling initialize fails", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.SetUninstalling(api.PackageNamespace+"-"+clusterName, clusterName)
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(fmt.Errorf("init crunch"))
result := sut.Process(mc)
assert.False(t, result)
thenManagerContext(t, mc, api.StateUninstalling, expectedEmptySource, 60*time.Second, "init crunch")
})
t.Run("Uninstalling fails", func(t *testing.T) {
mc, mockDriver := givenMocks(t)
mc.SetUninstalling(api.PackageNamespace+"-"+clusterName, clusterName)
mockDriver.EXPECT().Initialize(mc.Ctx, clusterName).Return(nil)
mockDriver.EXPECT().Uninstall(mc.Ctx, clusterName).Return(fmt.Errorf("crunch"))
result := sut.Process(mc)
assert.False(t, result)
thenManagerContext(t, mc, api.StateUninstalling, expectedEmptySource, 60*time.Second, "crunch")
})
t.Run("Bogus state is reported", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = "bogus"
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, "bogus", expectedEmptySource, time.Duration(0), "Unknown state: bogus")
})
t.Run("Unknown state is ignored", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = api.StateUnknown
result := sut.Process(mc)
assert.False(t, result)
thenManagerContext(t, mc, api.StateUnknown, expectedEmptySource, time.Duration(0), "")
})
t.Run("Package in wrong namespace should be ignored", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = ""
mc.Package.Namespace = "default"
result := sut.Process(mc)
assert.True(t, result)
thenManagerContext(t, mc, api.StateUnknown, expectedEmptySource, time.Duration(0), "Packages namespaces must start with: eksa-packages")
})
t.Run("Package in wrong namespace should be ignored again", func(t *testing.T) {
mc, _ := givenMocks(t)
mc.Package.Status.State = api.StateUnknown
mc.Package.Namespace = "default"
result := sut.Process(mc)
assert.False(t, result)
thenManagerContext(t, mc, api.StateUnknown, expectedEmptySource, time.Duration(0), "Packages namespaces must start with: eksa-packages")
})
}
| 492 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: manager.go
// Package mocks is a generated GoMock package.
package mocks
import (
reflect "reflect"
packages "github.com/aws/eks-anywhere-packages/pkg/packages"
gomock "github.com/golang/mock/gomock"
)
// MockManager is a mock of Manager interface.
type MockManager struct {
ctrl *gomock.Controller
recorder *MockManagerMockRecorder
}
// MockManagerMockRecorder is the mock recorder for MockManager.
type MockManagerMockRecorder struct {
mock *MockManager
}
// NewMockManager creates a new mock instance.
func NewMockManager(ctrl *gomock.Controller) *MockManager {
mock := &MockManager{ctrl: ctrl}
mock.recorder = &MockManagerMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockManager) EXPECT() *MockManagerMockRecorder {
return m.recorder
}
// Process mocks base method.
func (m *MockManager) Process(mc *packages.ManagerContext) bool {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Process", mc)
ret0, _ := ret[0].(bool)
return ret0
}
// Process indicates an expected call of Process.
func (mr *MockManagerMockRecorder) Process(mc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Process", reflect.TypeOf((*MockManager)(nil).Process), mc)
}
| 50 |
eks-anywhere-packages | aws | Go | package registry
import (
"fmt"
"strings"
)
// Artifact to head release dependency.
type Artifact struct {
Registry string
Repository string
Tag string
Digest string
}
// NewArtifact creates a new artifact object.
func NewArtifact(registry, repository, tag, digest string) Artifact {
return Artifact{
Registry: registry,
Repository: repository,
Tag: tag,
Digest: digest,
}
}
// ParseArtifactFromURI parses the URI into a new Artifact object.
func ParseArtifactFromURI(uri string) (*Artifact, error) {
elements := strings.SplitN(uri, "/", 2)
if len(elements) != 2 {
return nil, fmt.Errorf("registry not found")
}
registry := elements[0]
rol := elements[1]
var tag string
var digest string
elements = strings.SplitN(rol, "@", 2)
if len(elements) != 2 {
elements = strings.SplitN(rol, ":", 2)
if len(elements) != 2 {
return nil, fmt.Errorf("tag or digest not found")
}
tag = elements[1]
} else {
digest = elements[1]
}
repository := elements[0]
return &Artifact{
Registry: registry,
Repository: repository,
Tag: tag,
Digest: digest,
}, nil
}
// Version returns tag or digest.
func (art Artifact) Version() string {
if art.Digest != "" {
return "@" + art.Digest
}
return ":" + art.Tag
}
// VersionedImage returns full URI for image.
func (art Artifact) VersionedImage() string {
version := art.Version()
return art.Registry + "/" + art.Repository + version
}
| 69 |
eks-anywhere-packages | aws | Go | package registry_test
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/aws/eks-anywhere-packages/pkg/registry"
)
func TestArtifact_VersionTag(t *testing.T) {
artifact := registry.NewArtifact("localhost:8443", "owner/repo", "latest", "")
assert.Equal(t, ":latest", artifact.Version())
assert.Equal(t, "localhost:8443/owner/repo:latest", artifact.VersionedImage())
}
func TestArtifact_VersionDigest(t *testing.T) {
artifact := registry.NewArtifact("localhost:8443", "owner/repo", "", "sha256:0db6a")
assert.Equal(t, "@sha256:0db6a", artifact.Version())
assert.Equal(t, "localhost:8443/owner/repo@sha256:0db6a", artifact.VersionedImage())
}
func TestParseArtifactFromURI_VersionedImageMatchesURI(t *testing.T) {
artifact, err := registry.ParseArtifactFromURI("localhost:8443/owner/repo@sha256:0db6a")
require.NoError(t, err)
assert.Equal(t, "localhost:8443/owner/repo@sha256:0db6a", artifact.VersionedImage())
artifact, err = registry.ParseArtifactFromURI("localhost:8443/owner/repo:sometag")
require.NoError(t, err)
assert.Equal(t, "localhost:8443/owner/repo:sometag", artifact.VersionedImage())
}
| 33 |
eks-anywhere-packages | aws | Go | package registry
import (
"crypto/x509"
"fmt"
"os"
"path"
"path/filepath"
)
const (
registryConfigPath = "/tmp/config/registry"
certFile = "ca.crt"
insecureFile = "insecure"
)
func GetRegistryInsecure(clusterName string) bool {
caFile := path.Join(registryConfigPath, clusterName+"_"+insecureFile)
if _, err := os.Stat(caFile); err != nil {
return false
}
return true
}
func GetClusterCertificateFileName(clusterName string) string {
caFile := path.Join(registryConfigPath, clusterName+"_"+certFile)
if _, err := os.Stat(caFile); err != nil {
return ""
}
return caFile
}
func GetClusterCertificate(clusterName string) (certificates *x509.CertPool, err error) {
caFile := GetClusterCertificateFileName(clusterName)
if caFile == "" {
return nil, nil
}
return GetCertificates(caFile)
}
// GetCertificates get X509 certificates.
func GetCertificates(certFile string) (certificates *x509.CertPool, err error) {
if len(certFile) < 1 {
return nil, nil
}
fileContents, err := os.ReadFile(filepath.Clean(certFile))
if err != nil {
return nil, fmt.Errorf("error reading certificate file <%s>: %v", certFile, err)
}
certPool := x509.NewCertPool()
certPool.AppendCertsFromPEM(fileContents)
return certPool, nil
}
| 55 |
eks-anywhere-packages | aws | Go | package registry_test
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/aws/eks-anywhere-packages/pkg/registry"
)
func TestGetCertificatesSuccess(t *testing.T) {
result, err := registry.GetCertificates("testdata/harbor.eksa.demo.crt")
assert.NotNil(t, result)
assert.NoError(t, err)
}
func TestGetCertificatesNothing(t *testing.T) {
result, err := registry.GetCertificates("")
assert.Nil(t, result)
assert.NoError(t, err)
}
func TestGetCertificatesError(t *testing.T) {
result, err := registry.GetCertificates("bogus.crt")
assert.Nil(t, result)
assert.EqualError(t, err, "error reading certificate file <bogus.crt>: open bogus.crt: no such file or directory")
}
| 28 |
eks-anywhere-packages | aws | Go | package registry
import (
"context"
"crypto/tls"
"fmt"
"net/http"
"path"
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
"oras.land/oras-go/v2"
"oras.land/oras-go/v2/content"
orasregistry "oras.land/oras-go/v2/registry"
"oras.land/oras-go/v2/registry/remote"
"oras.land/oras-go/v2/registry/remote/auth"
)
//go:generate mockgen -destination=mocks/storage.go -package=mocks -source storage.go StorageClient
//go:generate mockgen -destination=mocks/repository.go -package=mocks oras.land/oras-go/v2/registry Repository
// OCIRegistryClient storage client for an OCI registry.
type OCIRegistryClient struct {
StorageContext
registry *remote.Registry
}
var _ StorageClient = (*OCIRegistryClient)(nil)
// NewOCIRegistry create an OCI registry client.
func NewOCIRegistry(sc StorageContext, registry *remote.Registry) *OCIRegistryClient {
transport := http.DefaultTransport.(*http.Transport).Clone()
{ // #nosec G402
transport.TLSClientConfig = &tls.Config{
RootCAs: sc.certificates,
InsecureSkipVerify: sc.insecure,
}
}
authClient := &auth.Client{
Client: &http.Client{
Transport: transport,
},
Cache: auth.NewCache(),
}
authClient.SetUserAgent("eksa")
authClient.Credential = func(ctx context.Context, s string) (auth.Credential, error) {
return sc.credentialStore.Credential(s)
}
registry.Client = authClient
return &OCIRegistryClient{
StorageContext: sc,
registry: registry,
}
}
// GetHost for registry host.
func (or *OCIRegistryClient) GetHost() string {
return or.host
}
// SetProject for registry destination.
func (or *OCIRegistryClient) SetProject(project string) {
or.project = project
}
// Destination of this storage registry.
func (or *OCIRegistryClient) Destination(image Artifact) string {
return path.Join(or.host, or.project, image.Repository) + image.Version()
}
// GetStorage object based on repository.
func (or *OCIRegistryClient) GetStorage(ctx context.Context, artifact Artifact) (repo orasregistry.Repository, err error) {
dstRepo := path.Join(or.project, artifact.Repository)
repo, err = or.registry.Repository(ctx, dstRepo)
if err != nil {
return nil, fmt.Errorf("error creating repository %s: %v", dstRepo, err)
}
return repo, nil
}
// Resolve the location of the source repository given the image.
func (or *OCIRegistryClient) Resolve(ctx context.Context, srcStorage orasregistry.Repository, versionedImage string) (desc ocispec.Descriptor, err error) {
or.registry.Reference.Reference = versionedImage
return srcStorage.Resolve(ctx, or.registry.Reference.Reference)
}
// FetchBytes a resource from the registry.
func (or *OCIRegistryClient) FetchBytes(ctx context.Context, srcStorage orasregistry.Repository, artifact Artifact) (ocispec.Descriptor, []byte, error) {
return oras.FetchBytes(ctx, srcStorage, artifact.VersionedImage(), oras.DefaultFetchBytesOptions)
}
// FetchBlob get named blob.
func (or *OCIRegistryClient) FetchBlob(ctx context.Context, srcStorage orasregistry.Repository, descriptor ocispec.Descriptor) ([]byte, error) {
return content.FetchAll(ctx, srcStorage, descriptor)
}
// CopyGraph copy manifest and all blobs to destination.
func (or *OCIRegistryClient) CopyGraph(ctx context.Context, srcStorage orasregistry.Repository, dstStorage orasregistry.Repository, desc ocispec.Descriptor) error {
extendedCopyOptions := oras.DefaultExtendedCopyOptions
return oras.CopyGraph(ctx, srcStorage, dstStorage, desc, extendedCopyOptions.CopyGraphOptions)
}
| 102 |
eks-anywhere-packages | aws | Go | package registry_test
import (
"context"
"crypto/x509"
"testing"
"github.com/docker/cli/cli/config"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"oras.land/oras-go/v2/registry/remote"
"github.com/aws/eks-anywhere-packages/pkg/registry"
)
var (
ctx = context.Background()
image = registry.Artifact{
Registry: "public.ecr.aws",
Repository: "eks-anywhere/eks-anywhere-packages",
Digest: "sha256:6efe21500abbfbb6b3e37b80dd5dea0b11a0d1b145e84298fee5d7784a77e967",
Tag: "0.2.22-eks-a-24",
}
certificates = &x509.CertPool{}
)
func TestOCIRegistryClient_Destination(t *testing.T) {
sc := newStorageContext(t, "")
sut := registry.NewOCIRegistry(sc, newTestRegistry(t, image.Registry))
destination := sut.Destination(image)
assert.Equal(t, "localhost/eks-anywhere/eks-anywhere-packages@sha256:6efe21500abbfbb6b3e37b80dd5dea0b11a0d1b145e84298fee5d7784a77e967", destination)
sut.SetProject("project/")
destination = sut.Destination(image)
assert.Equal(t, "localhost/project/eks-anywhere/eks-anywhere-packages@sha256:6efe21500abbfbb6b3e37b80dd5dea0b11a0d1b145e84298fee5d7784a77e967", destination)
}
func TestOCIRegistryClient_GetStorage(t *testing.T) {
sc := newStorageContext(t, "")
sut := registry.NewOCIRegistry(sc, newTestRegistry(t, image.Registry))
_, err := sut.GetStorage(context.Background(), image)
assert.NoError(t, err)
bogusImage := registry.Artifact{
Registry: "localhost",
Repository: "!@#$",
Digest: "sha256:6efe21500abbfbb6b3e37b80dd5dea0b11a0d1b145e84298fee5d7784a77e967",
}
_, err = sut.GetStorage(context.Background(), bogusImage)
assert.EqualError(t, err, "error creating repository !@#$: invalid reference: invalid repository")
}
func newStorageContext(t *testing.T, dir string) registry.StorageContext {
configFile, err := config.Load(dir)
require.NoError(t, err)
store := registry.NewDockerCredentialStore(configFile)
return registry.NewStorageContext("localhost", store, certificates, false)
}
func newTestRegistry(t *testing.T, host string) *remote.Registry {
t.Helper()
r, err := remote.NewRegistry(host)
require.NoError(t, err)
return r
}
| 65 |
eks-anywhere-packages | aws | Go | package registry
import (
"github.com/docker/cli/cli/config"
"github.com/docker/cli/cli/config/configfile"
"github.com/docker/cli/cli/config/credentials"
"oras.land/oras-go/v2/registry/remote/auth"
)
// DockerCredentialStore for Docker registry credentials, like ~/.docker/config.json.
type DockerCredentialStore struct {
configFile *configfile.ConfigFile
}
// CredentialsConfigLoad load credentials from directory.
func CredentialsConfigLoad() (*configfile.ConfigFile, error) {
return config.Load(registryConfigPath)
}
// NewDockerCredentialStore creates a DockerCredentialStore.
func NewDockerCredentialStore(configFile *configfile.ConfigFile) *DockerCredentialStore {
if !configFile.ContainsAuth() {
configFile.CredentialsStore = credentials.DetectDefaultStore(configFile.CredentialsStore)
}
return &DockerCredentialStore{
configFile: configFile,
}
}
// Credential get an authentication credential for a given registry.
func (cs *DockerCredentialStore) Credential(registry string) (auth.Credential, error) {
authConf, err := cs.configFile.GetCredentialsStore(registry).Get(registry)
if err != nil {
return auth.EmptyCredential, err
}
cred := auth.Credential{
Username: authConf.Username,
Password: authConf.Password,
AccessToken: authConf.RegistryToken,
RefreshToken: authConf.IdentityToken,
}
return cred, nil
}
| 44 |
eks-anywhere-packages | aws | Go | package registry_test
import (
"testing"
"github.com/docker/cli/cli/config"
"github.com/docker/cli/cli/config/configfile"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"oras.land/oras-go/v2/registry/remote/auth"
"github.com/aws/eks-anywhere-packages/pkg/registry"
)
func TestDockerCredentialStore(t *testing.T) {
configFile := newConfigFile(t, "testdata")
credentialStore := registry.NewDockerCredentialStore(configFile)
result, err := credentialStore.Credential("localhost")
require.NoError(t, err)
assertAuthEqual(t, auth.Credential{Username: "user", Password: "pass"}, result)
result, err = credentialStore.Credential("harbor.eksa.demo:30003")
require.NoError(t, err)
assertAuthEqual(t, auth.Credential{Username: "captain", Password: "haddock"}, result)
result, err = credentialStore.Credential("bogus")
require.NoError(t, err)
assertAuthEqual(t, auth.EmptyCredential, result)
result, err = credentialStore.Credential("5551212.dkr.ecr.us-west-2.amazonaws.com")
// This is a generic error, so using errors.Is won't work, and this is as
// much of the string as we can reliably match against in a cross-platform
// fashion. Until they change it, then everything will break.
require.ErrorContains(t, err, "error getting credentials - err")
assertAuthEqual(t, auth.EmptyCredential, result)
}
func TestCredentialStore_InitEmpty(t *testing.T) {
registry.NewDockerCredentialStore(newConfigFile(t, "testdata/empty"))
}
func newConfigFile(t *testing.T, dir string) *configfile.ConfigFile {
t.Helper()
configFile, err := config.Load(dir)
require.NoError(t, err)
return configFile
}
func assertAuthEqual(t *testing.T, expected, got auth.Credential) {
t.Helper()
assert.Equal(t, expected.Username, got.Username)
assert.Equal(t, expected.Password, got.Password)
assert.Equal(t, expected.AccessToken, got.AccessToken)
assert.Equal(t, expected.RefreshToken, got.RefreshToken)
}
| 57 |
eks-anywhere-packages | aws | Go | package registry
import (
"context"
"encoding/json"
"fmt"
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
)
// PullBytes a resource from the registry.
func PullBytes(ctx context.Context, sc StorageClient, artifact Artifact) (data []byte, err error) {
srcStorage, err := sc.GetStorage(ctx, artifact)
if err != nil {
return nil, fmt.Errorf("repository source: %v", err)
}
_, data, err = sc.FetchBytes(ctx, srcStorage, artifact)
if err != nil {
return nil, fmt.Errorf("fetch manifest: %v", err)
}
var mani ocispec.Manifest
if err := json.Unmarshal(data, &mani); err != nil {
return nil, fmt.Errorf("unmarshal manifest: %v", err)
}
if len(mani.Layers) < 1 {
return nil, fmt.Errorf("missing layer")
}
data, err = sc.FetchBlob(ctx, srcStorage, mani.Layers[0])
if err != nil {
return nil, fmt.Errorf("fetch blob: %v", err)
}
return data, err
}
| 37 |
eks-anywhere-packages | aws | Go | package registry_test
import (
_ "embed"
"fmt"
"testing"
"github.com/golang/mock/gomock"
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
"github.com/stretchr/testify/assert"
"github.com/aws/eks-anywhere-packages/pkg/registry"
"github.com/aws/eks-anywhere-packages/pkg/registry/mocks"
)
//go:embed testdata/image-manifest.json
var imageManifest []byte
//go:embed testdata/bad-image-manifest.json
var badImageManifest []byte
//go:embed testdata/no-layer-image-manifest.json
var noLayersImageManifest []byte
//go:embed testdata/package-bundle.yaml
var packageBundle []byte
var srcArtifact = registry.Artifact{
Registry: "public.ecr.aws",
Repository: "l0g8r8j6/kube-vip/kube-vip",
Tag: "v0.5.5-eks-a-v0.0.0-dev-build.4452",
Digest: "sha256:6efe21500abbfbb6b3e37b80dd5dea0b11a0d1b145e84298fee5d7784a77e967",
}
func TestPull(t *testing.T) {
srcClient := mocks.NewMockStorageClient(gomock.NewController(t))
mockSrcRepo := *mocks.NewMockRepository(gomock.NewController(t))
desc := ocispec.Descriptor{
Digest: "sha256:8bc5f46db8c98aedfba4ade0d7ebbdecd8e4130e172d3d62871fc3258c40a910",
}
srcClient.EXPECT().GetStorage(ctx, srcArtifact).Return(&mockSrcRepo, nil)
srcClient.EXPECT().FetchBytes(ctx, &mockSrcRepo, srcArtifact).Return(desc, imageManifest, nil)
srcClient.EXPECT().FetchBlob(ctx, &mockSrcRepo, gomock.Any()).Return(packageBundle, nil)
result, err := registry.PullBytes(ctx, srcClient, srcArtifact)
assert.NotEmpty(t, result)
assert.NoError(t, err)
}
func TestPullFetchBlobFail(t *testing.T) {
srcClient := mocks.NewMockStorageClient(gomock.NewController(t))
mockSrcRepo := *mocks.NewMockRepository(gomock.NewController(t))
desc := ocispec.Descriptor{
Digest: "sha256:8bc5f46db8c98aedfba4ade0d7ebbdecd8e4130e172d3d62871fc3258c40a910",
}
srcClient.EXPECT().GetStorage(ctx, srcArtifact).Return(&mockSrcRepo, nil)
srcClient.EXPECT().FetchBytes(ctx, &mockSrcRepo, srcArtifact).Return(desc, imageManifest, nil)
srcClient.EXPECT().FetchBlob(ctx, &mockSrcRepo, gomock.Any()).Return(packageBundle, fmt.Errorf("oops"))
result, err := registry.PullBytes(ctx, srcClient, srcArtifact)
assert.Nil(t, result)
assert.EqualError(t, err, "fetch blob: oops")
}
func TestPullUnmarshalFail(t *testing.T) {
srcClient := mocks.NewMockStorageClient(gomock.NewController(t))
mockSrcRepo := *mocks.NewMockRepository(gomock.NewController(t))
desc := ocispec.Descriptor{
Digest: "sha256:8bc5f46db8c98aedfba4ade0d7ebbdecd8e4130e172d3d62871fc3258c40a910",
}
srcClient.EXPECT().GetStorage(ctx, srcArtifact).Return(&mockSrcRepo, nil)
srcClient.EXPECT().FetchBytes(ctx, &mockSrcRepo, srcArtifact).Return(desc, badImageManifest, nil)
result, err := registry.PullBytes(ctx, srcClient, srcArtifact)
assert.Nil(t, result)
assert.EqualError(t, err, "unmarshal manifest: unexpected end of JSON input")
}
func TestPullNoLayerFail(t *testing.T) {
srcClient := mocks.NewMockStorageClient(gomock.NewController(t))
mockSrcRepo := *mocks.NewMockRepository(gomock.NewController(t))
desc := ocispec.Descriptor{
Digest: "sha256:8bc5f46db8c98aedfba4ade0d7ebbdecd8e4130e172d3d62871fc3258c40a910",
}
srcClient.EXPECT().GetStorage(ctx, srcArtifact).Return(&mockSrcRepo, nil)
srcClient.EXPECT().FetchBytes(ctx, &mockSrcRepo, srcArtifact).Return(desc, noLayersImageManifest, nil)
result, err := registry.PullBytes(ctx, srcClient, srcArtifact)
assert.Nil(t, result)
assert.EqualError(t, err, "missing layer")
}
func TestPullFetchBytesFail(t *testing.T) {
srcClient := mocks.NewMockStorageClient(gomock.NewController(t))
mockSrcRepo := *mocks.NewMockRepository(gomock.NewController(t))
desc := ocispec.Descriptor{
Digest: "sha256:8bc5f46db8c98aedfba4ade0d7ebbdecd8e4130e172d3d62871fc3258c40a910",
}
srcClient.EXPECT().GetStorage(ctx, srcArtifact).Return(&mockSrcRepo, nil)
srcClient.EXPECT().FetchBytes(ctx, &mockSrcRepo, srcArtifact).Return(desc, imageManifest, fmt.Errorf("oops"))
result, err := registry.PullBytes(ctx, srcClient, srcArtifact)
assert.Nil(t, result)
assert.EqualError(t, err, "fetch manifest: oops")
}
func TestPullGetStorageFail(t *testing.T) {
srcClient := mocks.NewMockStorageClient(gomock.NewController(t))
mockSrcRepo := *mocks.NewMockRepository(gomock.NewController(t))
srcClient.EXPECT().GetStorage(ctx, srcArtifact).Return(&mockSrcRepo, fmt.Errorf("oops"))
result, err := registry.PullBytes(ctx, srcClient, srcArtifact)
assert.Nil(t, result)
assert.EqualError(t, err, "repository source: oops")
}
| 122 |
eks-anywhere-packages | aws | Go | package registry
import (
"context"
"crypto/x509"
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
orasregistry "oras.land/oras-go/v2/registry"
)
// StorageContext describes aspects of a registry.
type StorageContext struct {
host string
project string
credentialStore *DockerCredentialStore
certificates *x509.CertPool
insecure bool
}
// NewStorageContext create registry context.
func NewStorageContext(host string, credentialStore *DockerCredentialStore, certificates *x509.CertPool, insecure bool) StorageContext {
return StorageContext{
host: host,
credentialStore: credentialStore,
certificates: certificates,
insecure: insecure,
}
}
// StorageClient interface for general image storage client.
type StorageClient interface {
Resolve(ctx context.Context, srcStorage orasregistry.Repository, versionedImage string) (desc ocispec.Descriptor, err error)
GetStorage(ctx context.Context, image Artifact) (repo orasregistry.Repository, err error)
SetProject(project string)
Destination(image Artifact) string
FetchBytes(ctx context.Context, srcStorage orasregistry.Repository, artifact Artifact) (ocispec.Descriptor, []byte, error)
FetchBlob(ctx context.Context, srcStorage orasregistry.Repository, descriptor ocispec.Descriptor) ([]byte, error)
CopyGraph(ctx context.Context, srcStorage orasregistry.Repository, dstStorage orasregistry.Repository, desc ocispec.Descriptor) error
}
| 40 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: oras.land/oras-go/v2/registry (interfaces: Repository)
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
io "io"
reflect "reflect"
gomock "github.com/golang/mock/gomock"
v1 "github.com/opencontainers/image-spec/specs-go/v1"
registry "oras.land/oras-go/v2/registry"
)
// MockRepository is a mock of Repository interface.
type MockRepository struct {
ctrl *gomock.Controller
recorder *MockRepositoryMockRecorder
}
// MockRepositoryMockRecorder is the mock recorder for MockRepository.
type MockRepositoryMockRecorder struct {
mock *MockRepository
}
// NewMockRepository creates a new mock instance.
func NewMockRepository(ctrl *gomock.Controller) *MockRepository {
mock := &MockRepository{ctrl: ctrl}
mock.recorder = &MockRepositoryMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockRepository) EXPECT() *MockRepositoryMockRecorder {
return m.recorder
}
// Blobs mocks base method.
func (m *MockRepository) Blobs() registry.BlobStore {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Blobs")
ret0, _ := ret[0].(registry.BlobStore)
return ret0
}
// Blobs indicates an expected call of Blobs.
func (mr *MockRepositoryMockRecorder) Blobs() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Blobs", reflect.TypeOf((*MockRepository)(nil).Blobs))
}
// Delete mocks base method.
func (m *MockRepository) Delete(arg0 context.Context, arg1 v1.Descriptor) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Delete", arg0, arg1)
ret0, _ := ret[0].(error)
return ret0
}
// Delete indicates an expected call of Delete.
func (mr *MockRepositoryMockRecorder) Delete(arg0, arg1 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Delete", reflect.TypeOf((*MockRepository)(nil).Delete), arg0, arg1)
}
// Exists mocks base method.
func (m *MockRepository) Exists(arg0 context.Context, arg1 v1.Descriptor) (bool, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Exists", arg0, arg1)
ret0, _ := ret[0].(bool)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Exists indicates an expected call of Exists.
func (mr *MockRepositoryMockRecorder) Exists(arg0, arg1 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Exists", reflect.TypeOf((*MockRepository)(nil).Exists), arg0, arg1)
}
// Fetch mocks base method.
func (m *MockRepository) Fetch(arg0 context.Context, arg1 v1.Descriptor) (io.ReadCloser, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Fetch", arg0, arg1)
ret0, _ := ret[0].(io.ReadCloser)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Fetch indicates an expected call of Fetch.
func (mr *MockRepositoryMockRecorder) Fetch(arg0, arg1 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Fetch", reflect.TypeOf((*MockRepository)(nil).Fetch), arg0, arg1)
}
// FetchReference mocks base method.
func (m *MockRepository) FetchReference(arg0 context.Context, arg1 string) (v1.Descriptor, io.ReadCloser, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FetchReference", arg0, arg1)
ret0, _ := ret[0].(v1.Descriptor)
ret1, _ := ret[1].(io.ReadCloser)
ret2, _ := ret[2].(error)
return ret0, ret1, ret2
}
// FetchReference indicates an expected call of FetchReference.
func (mr *MockRepositoryMockRecorder) FetchReference(arg0, arg1 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FetchReference", reflect.TypeOf((*MockRepository)(nil).FetchReference), arg0, arg1)
}
// Manifests mocks base method.
func (m *MockRepository) Manifests() registry.ManifestStore {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Manifests")
ret0, _ := ret[0].(registry.ManifestStore)
return ret0
}
// Manifests indicates an expected call of Manifests.
func (mr *MockRepositoryMockRecorder) Manifests() *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Manifests", reflect.TypeOf((*MockRepository)(nil).Manifests))
}
// Push mocks base method.
func (m *MockRepository) Push(arg0 context.Context, arg1 v1.Descriptor, arg2 io.Reader) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Push", arg0, arg1, arg2)
ret0, _ := ret[0].(error)
return ret0
}
// Push indicates an expected call of Push.
func (mr *MockRepositoryMockRecorder) Push(arg0, arg1, arg2 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Push", reflect.TypeOf((*MockRepository)(nil).Push), arg0, arg1, arg2)
}
// PushReference mocks base method.
func (m *MockRepository) PushReference(arg0 context.Context, arg1 v1.Descriptor, arg2 io.Reader, arg3 string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "PushReference", arg0, arg1, arg2, arg3)
ret0, _ := ret[0].(error)
return ret0
}
// PushReference indicates an expected call of PushReference.
func (mr *MockRepositoryMockRecorder) PushReference(arg0, arg1, arg2, arg3 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PushReference", reflect.TypeOf((*MockRepository)(nil).PushReference), arg0, arg1, arg2, arg3)
}
// Referrers mocks base method.
func (m *MockRepository) Referrers(arg0 context.Context, arg1 v1.Descriptor, arg2 string, arg3 func([]v1.Descriptor) error) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Referrers", arg0, arg1, arg2, arg3)
ret0, _ := ret[0].(error)
return ret0
}
// Referrers indicates an expected call of Referrers.
func (mr *MockRepositoryMockRecorder) Referrers(arg0, arg1, arg2, arg3 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Referrers", reflect.TypeOf((*MockRepository)(nil).Referrers), arg0, arg1, arg2, arg3)
}
// Resolve mocks base method.
func (m *MockRepository) Resolve(arg0 context.Context, arg1 string) (v1.Descriptor, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Resolve", arg0, arg1)
ret0, _ := ret[0].(v1.Descriptor)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Resolve indicates an expected call of Resolve.
func (mr *MockRepositoryMockRecorder) Resolve(arg0, arg1 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Resolve", reflect.TypeOf((*MockRepository)(nil).Resolve), arg0, arg1)
}
// Tag mocks base method.
func (m *MockRepository) Tag(arg0 context.Context, arg1 v1.Descriptor, arg2 string) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Tag", arg0, arg1, arg2)
ret0, _ := ret[0].(error)
return ret0
}
// Tag indicates an expected call of Tag.
func (mr *MockRepositoryMockRecorder) Tag(arg0, arg1, arg2 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tag", reflect.TypeOf((*MockRepository)(nil).Tag), arg0, arg1, arg2)
}
// Tags mocks base method.
func (m *MockRepository) Tags(arg0 context.Context, arg1 string, arg2 func([]string) error) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Tags", arg0, arg1, arg2)
ret0, _ := ret[0].(error)
return ret0
}
// Tags indicates an expected call of Tags.
func (mr *MockRepositoryMockRecorder) Tags(arg0, arg1, arg2 interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tags", reflect.TypeOf((*MockRepository)(nil).Tags), arg0, arg1, arg2)
}
| 212 |
eks-anywhere-packages | aws | Go | // Code generated by MockGen. DO NOT EDIT.
// Source: storage.go
// Package mocks is a generated GoMock package.
package mocks
import (
context "context"
reflect "reflect"
registry "github.com/aws/eks-anywhere-packages/pkg/registry"
gomock "github.com/golang/mock/gomock"
v1 "github.com/opencontainers/image-spec/specs-go/v1"
registry0 "oras.land/oras-go/v2/registry"
)
// MockStorageClient is a mock of StorageClient interface.
type MockStorageClient struct {
ctrl *gomock.Controller
recorder *MockStorageClientMockRecorder
}
// MockStorageClientMockRecorder is the mock recorder for MockStorageClient.
type MockStorageClientMockRecorder struct {
mock *MockStorageClient
}
// NewMockStorageClient creates a new mock instance.
func NewMockStorageClient(ctrl *gomock.Controller) *MockStorageClient {
mock := &MockStorageClient{ctrl: ctrl}
mock.recorder = &MockStorageClientMockRecorder{mock}
return mock
}
// EXPECT returns an object that allows the caller to indicate expected use.
func (m *MockStorageClient) EXPECT() *MockStorageClientMockRecorder {
return m.recorder
}
// CopyGraph mocks base method.
func (m *MockStorageClient) CopyGraph(ctx context.Context, srcStorage, dstStorage registry0.Repository, desc v1.Descriptor) error {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "CopyGraph", ctx, srcStorage, dstStorage, desc)
ret0, _ := ret[0].(error)
return ret0
}
// CopyGraph indicates an expected call of CopyGraph.
func (mr *MockStorageClientMockRecorder) CopyGraph(ctx, srcStorage, dstStorage, desc interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CopyGraph", reflect.TypeOf((*MockStorageClient)(nil).CopyGraph), ctx, srcStorage, dstStorage, desc)
}
// Destination mocks base method.
func (m *MockStorageClient) Destination(image registry.Artifact) string {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Destination", image)
ret0, _ := ret[0].(string)
return ret0
}
// Destination indicates an expected call of Destination.
func (mr *MockStorageClientMockRecorder) Destination(image interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Destination", reflect.TypeOf((*MockStorageClient)(nil).Destination), image)
}
// FetchBlob mocks base method.
func (m *MockStorageClient) FetchBlob(ctx context.Context, srcStorage registry0.Repository, descriptor v1.Descriptor) ([]byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FetchBlob", ctx, srcStorage, descriptor)
ret0, _ := ret[0].([]byte)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// FetchBlob indicates an expected call of FetchBlob.
func (mr *MockStorageClientMockRecorder) FetchBlob(ctx, srcStorage, descriptor interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FetchBlob", reflect.TypeOf((*MockStorageClient)(nil).FetchBlob), ctx, srcStorage, descriptor)
}
// FetchBytes mocks base method.
func (m *MockStorageClient) FetchBytes(ctx context.Context, srcStorage registry0.Repository, artifact registry.Artifact) (v1.Descriptor, []byte, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "FetchBytes", ctx, srcStorage, artifact)
ret0, _ := ret[0].(v1.Descriptor)
ret1, _ := ret[1].([]byte)
ret2, _ := ret[2].(error)
return ret0, ret1, ret2
}
// FetchBytes indicates an expected call of FetchBytes.
func (mr *MockStorageClientMockRecorder) FetchBytes(ctx, srcStorage, artifact interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "FetchBytes", reflect.TypeOf((*MockStorageClient)(nil).FetchBytes), ctx, srcStorage, artifact)
}
// GetStorage mocks base method.
func (m *MockStorageClient) GetStorage(ctx context.Context, image registry.Artifact) (registry0.Repository, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "GetStorage", ctx, image)
ret0, _ := ret[0].(registry0.Repository)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// GetStorage indicates an expected call of GetStorage.
func (mr *MockStorageClientMockRecorder) GetStorage(ctx, image interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetStorage", reflect.TypeOf((*MockStorageClient)(nil).GetStorage), ctx, image)
}
// Resolve mocks base method.
func (m *MockStorageClient) Resolve(ctx context.Context, srcStorage registry0.Repository, versionedImage string) (v1.Descriptor, error) {
m.ctrl.T.Helper()
ret := m.ctrl.Call(m, "Resolve", ctx, srcStorage, versionedImage)
ret0, _ := ret[0].(v1.Descriptor)
ret1, _ := ret[1].(error)
return ret0, ret1
}
// Resolve indicates an expected call of Resolve.
func (mr *MockStorageClientMockRecorder) Resolve(ctx, srcStorage, versionedImage interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Resolve", reflect.TypeOf((*MockStorageClient)(nil).Resolve), ctx, srcStorage, versionedImage)
}
// SetProject mocks base method.
func (m *MockStorageClient) SetProject(project string) {
m.ctrl.T.Helper()
m.ctrl.Call(m, "SetProject", project)
}
// SetProject indicates an expected call of SetProject.
func (mr *MockStorageClientMockRecorder) SetProject(project interface{}) *gomock.Call {
mr.mock.ctrl.T.Helper()
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetProject", reflect.TypeOf((*MockStorageClient)(nil).SetProject), project)
}
| 140 |
eks-anywhere-packages | aws | Go | package signature
type Domain struct {
Name string
Pubkey string
}
| 7 |
eks-anywhere-packages | aws | Go | package signature
import (
"bytes"
"crypto/ecdsa"
"crypto/sha256"
"crypto/x509"
"encoding/base64"
"encoding/json"
"errors"
"path"
"strings"
"text/template"
"github.com/itchyny/gojq"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/yaml"
)
const (
PublicKey = "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnP0Yo+ZxzPUEfohcG3bbJ8987UT4f0tj+XVBjS/s35wkfjrxTKrVZQpz3ta3zi5ZlgXzd7a20B1U1Py/TtPsxw=="
DomainName = "eksa.aws.com"
SignatureAnnotation = "signature"
ExcludesAnnotation = "excludes"
)
var EksaDomain = Domain{Name: DomainName, Pubkey: PublicKey}
type GojqParams struct {
Excludes []string
Domain Domain
}
var (
AlwaysExcluded = []string{
".status",
".metadata.creationTimestamp",
".metadata.generation",
".metadata.managedFields",
".metadata.uid",
".metadata.resourceVersion",
".spec.minControllerVersion",
}
GojqTemplate = template.Must(template.New("gojq_query").Funcs(
template.FuncMap{
"StringsJoin": strings.Join,
"Escape": func(in string) string {
return strings.ReplaceAll(in, ".", "\\\\.")
},
}).Parse(`
del({{ StringsJoin .Excludes ", "}}) | (.metadata.annotations | objects) |= with_entries(select(.key | test("^{{ Escape .Domain.Name }}/(?:includes|excludes)$") ))
`))
)
type Manifest = metav1.ObjectMetaAccessor
func filter(in []string) []string {
filtered := in[:0]
for _, s := range in {
if s != "" {
filtered = append(filtered, s)
}
}
return filtered
}
func decodeSelectors(selectorsB64Encoded string) (selectors []string, err error) {
decoded, err := base64.StdEncoding.DecodeString(selectorsB64Encoded)
if err != nil {
return selectors, err
}
selectors = filter(strings.Split(string(decoded), "\n"))
for _, arg := range selectors {
parsed, err := gojq.Parse(arg)
if err != nil {
return nil, err
}
if parsed.Term == nil || parsed.Term.Type != gojq.TermTypeIndex {
return nil, errors.New("invalid selector(s) provided")
}
}
return selectors, err
}
func GetMetadataInformation(manifest Manifest, domain Domain) (signature string, excludes []string, err error) {
meta := manifest.GetObjectMeta()
annotations := meta.GetAnnotations()
signature = annotations[path.Join(domain.Name, SignatureAnnotation)]
excludesB64, excludesExists := annotations[path.Join(domain.Name, ExcludesAnnotation)]
if excludesExists {
excludes, err = decodeSelectors(excludesB64)
if err != nil {
return signature, excludes, err
}
}
return signature, excludes, err
}
func GetDigest(manifest Manifest, domain Domain) (digest [32]byte, yml []byte, err error) {
var query *gojq.Query
_, excludes, err := GetMetadataInformation(manifest, domain)
if err != nil {
return [32]byte{}, nil, err
}
renderedQuery := &bytes.Buffer{}
err = GojqTemplate.Execute(renderedQuery, GojqParams{
append(excludes, AlwaysExcluded...),
domain,
})
if err != nil {
return [32]byte{}, nil, err
}
query, err = gojq.Parse(renderedQuery.String())
if err != nil {
return [32]byte{}, nil, err
}
// gojq requires running on raw types, marshal and unmarshall to allow it.
asjson, _ := json.Marshal(manifest)
var unmarshalled interface{}
_ = json.Unmarshal(asjson, &unmarshalled)
jsonIt := query.Run(unmarshalled)
filtered, remaining := jsonIt.Next()
if remaining {
second, rem := jsonIt.Next()
if second != nil && !rem {
return [32]byte{}, nil, errors.New("multiple result from the query should never happen")
}
}
yml, err = yaml.Marshal(filtered)
if err != nil {
return [32]byte{}, nil, errors.New("manifest could not be marshaled to yaml")
}
digest = sha256.Sum256(yml)
return digest, yml, err
}
// See ./testdata/sign_file.sh for a shell script implementation.
// This here differs in that it normalizes quoting while the shell script doesnt (yet).
func ValidateSignature(manifest Manifest, domain Domain) (valid bool, digest [32]byte, yml []byte, err error) {
metaSig, _, err := GetMetadataInformation(manifest, domain)
if err != nil {
return false, [32]byte{}, yml, err
}
if metaSig == "" {
return false, [32]byte{}, yml, errors.New("Missing signature")
}
digest, yml, err = GetDigest(manifest, domain)
if err != nil {
return false, [32]byte{}, yml, err
}
sig, err := base64.StdEncoding.DecodeString(metaSig)
if err != nil {
return false, digest, yml, errors.New("signature in metadata isn't base64 encoded")
}
pubdecoded, err := base64.StdEncoding.DecodeString(domain.Pubkey)
if err != nil {
return false, digest, yml, errors.New("unable to decode the public key (not base 64)")
}
pubparsed, err := x509.ParsePKIXPublicKey(pubdecoded)
if err != nil {
return false, digest, yml, errors.New("unable parse the public key (not PKIX)")
}
pubkey := pubparsed.(*ecdsa.PublicKey)
return ecdsa.VerifyASN1(pubkey, digest[:], sig), digest, yml, nil
}
| 172 |
eks-anywhere-packages | aws | Go | package signature_test
import (
"crypto/sha256"
"encoding/base64"
"os"
"path/filepath"
"strings"
"testing"
"github.com/stretchr/testify/assert"
"github.com/aws/eks-anywhere-packages/pkg/signature"
"github.com/aws/eks-anywhere-packages/pkg/testutil"
)
const (
TestPublicKey = "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvME/v61IfA4ulmgdF10Ae/WCRqtXvrUtF+0nu0dbdP36u3He4GRepYdQGCmbPe0463yAABZs01/Vv/v52ktlmg=="
)
var (
EksaDomain = Domain{Name: "eksa.aws.com", Pubkey: TestPublicKey}
ExcludesAnnotation = signature.ExcludesAnnotation
SignatureAnnotation = signature.SignatureAnnotation
)
type Domain = signature.Domain
var (
ValidateSignature = signature.ValidateSignature
GetDigest = signature.GetDigest
GetMetadataInformation = signature.GetMetadataInformation
)
func encodedSelectors(selectors []string) (encoded string) {
return base64.StdEncoding.EncodeToString([]byte(strings.Join(selectors, "\n")))
}
func TestValidateSignature(t *testing.T) {
t.Run("valid signature on valid manifest", func(t *testing.T) {
bundle, err := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
if err != nil {
t.Fatal("Unable to get bundle", err)
}
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.True(t, valid, "Signature should be valid for the EKS-A domain")
assert.Nilf(t, err, "An error occured validating the signature: %v", err)
})
t.Run("invalid signature on valid manifest", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
annotations[EksaDomain.Name+"/"+SignatureAnnotation] = "XEQCIForAHp6tPUhkfqLfAzbmq0v7p/hgJEqrB5ScWNB4rOOAiBlNtJUzTWNKGxpTepnm8co0YzoNX2HjXRTvaBYQy54Tg=="
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature should be invalid for the EKS-A domain")
assert.Nilf(t, err, "An error occured validating the signature: %v", err)
})
t.Run("request for different domain, valid eksa signature, missing requested signature", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
valid, _, _, err := ValidateSignature(bundle, Domain{Name: "eksx.amazon.com", Pubkey: "notakey"})
assert.False(t, valid, "Signature should be invalid for the provided domain")
assert.EqualError(t, err, "Missing signature")
})
t.Run("request for different domain, missing eksa signature, requested signature invalid", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
domain := Domain{Name: "fakedomain.com", Pubkey: EksaDomain.Pubkey}
annotations[domain.Name+"/signature"] = annotations[EksaDomain.Name+"/signature"]
delete(annotations, EksaDomain.Name+"/signature")
annotations[domain.Name+"/excludes"] = annotations[EksaDomain.Name+"/excludes"]
delete(annotations, EksaDomain.Name+"/excludes")
valid, _, _, err := ValidateSignature(bundle, domain)
assert.False(t, valid, "Signature should be invalid for the provided domain because `excludes` was changed to a different domain")
assert.Nil(t, err, "No error should occur when validating this signature")
valid, _, _, err = ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature should be invalid for the Eksa domain")
assert.EqualError(t, err, "Missing signature")
})
t.Run("Valid document with all fields excluded must fail signature validation", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
excludes := []string{".apiVersion", ".kind", ".metadata", ".spec"}
annotations[EksaDomain.Name+"/excludes"] = encodedSelectors(excludes)
digest, _, err := GetDigest(bundle, EksaDomain)
// An empty object serializes to "{}" in yaml.
assert.Equal(t, sha256.Sum256([]byte("{}\n")), digest, "This tests validates the behavior of an affectively empty document signature made empty via excludes")
assert.NoError(t, err)
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature should be invalid as it's signing actual content")
assert.Nil(t, err, "No error should occur when validating this signature")
})
t.Run("Removing the signature causes validation to fail", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
delete(annotations, EksaDomain.Name+"/signature")
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature should be invalid as it is missing")
assert.EqualError(t, err, "Missing signature")
})
t.Run("Invalid signature format causes validation to fail with an helpful message", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
annotations[EksaDomain.Name+"/signature"] = annotations[EksaDomain.Name+"/signature"] + "="
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature should be invalid as it is missing")
assert.EqualError(t, err, "signature in metadata isn't base64 encoded")
})
t.Run("An otherwise valid signature invalid for the provided excludes fails verification", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
excludes := []string{".spec.packages[].source.repository", ".spec.packages[].source.registry", ".spec.packages[].source.name"}
annotations[EksaDomain.Name+"/excludes"] = encodedSelectors(excludes)
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature should be invalid as it is missing")
assert.Nil(t, err, "No error, the signature is simply invalid")
})
t.Run("Any modification to excludes, even no-op renders the signature invalid", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
excludes := []string{".spec.packages[].source.repository", ".spec.packages[].source.registry", ".potato"}
annotations[EksaDomain.Name+"/excludes"] = encodedSelectors(excludes)
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.False(t, valid, "Signature is invalid, .potato was added to excludes, invalidating the signature")
assert.Nil(t, err, "No error, the signature is simply invalid")
})
t.Run("A pod could also be signed", func(t *testing.T) {
pod, _, _ := testutil.GivenPod("testdata/pod_valid.yaml")
valid, _, _, err := ValidateSignature(pod, EksaDomain)
assert.True(t, valid, "Signature should be valid")
assert.Nil(t, err, "No error, the signature should be valid")
})
t.Run("A packagebundle with minControllerVersion can be validated", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_minControllerVersion.yaml")
valid, _, _, err := ValidateSignature(bundle, EksaDomain)
assert.True(t, valid, "The signature should be valid")
assert.Nil(t, err, "No error, the signature is simply invalid")
})
}
func TestMetadata(t *testing.T) {
t.Run("Basic metadata on valid manifest", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
sig, excludes, _ := GetMetadataInformation(bundle, EksaDomain)
assert.ElementsMatchf(t, excludes, []string{".spec.packages[].source.registry", ".spec.packages[].source.repository"}, "Excludes doesn't match the expected value")
assert.IsType(t, "", sig)
assert.Len(t, sig, 96, "Signature length is wrong")
})
t.Run("Invalid excludes fails", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
annotations[EksaDomain.Name+"/"+ExcludesAnnotation] = encodedSelectors([]string{"invalid"})
_, excludes, err := GetMetadataInformation(bundle, EksaDomain)
assert.EqualError(t, err, "invalid selector(s) provided")
assert.Nil(t, excludes)
annotations[EksaDomain.Name+"/"+ExcludesAnnotation] = annotations[EksaDomain.Name+"/"+ExcludesAnnotation] + "AA" // Invalid b64
_, excludes, err = GetMetadataInformation(bundle, EksaDomain)
var b64Error base64.CorruptInputError = 12
assert.ErrorIs(t, err, b64Error, "Wrong error type")
assert.Nil(t, excludes)
})
t.Run("jq imports fail validation", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
annotations[EksaDomain.Name+"/"+ExcludesAnnotation] = encodedSelectors([]string{"import \"test\""})
_, excludes, err := GetMetadataInformation(bundle, EksaDomain)
assert.NotNil(t, err)
assert.Nil(t, excludes)
})
}
func TestDigest(t *testing.T) {
t.Run("Basic digest on valid manifest", func(t *testing.T) {
bundle, err := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
assert.NoError(t, err)
expectedDigest, err := os.ReadFile(filepath.Clean("testdata/packagebundle_valid.yaml") + ".digest")
assert.NoError(t, err)
digest, _, err := GetDigest(bundle, EksaDomain)
if err != nil {
t.Error(err)
}
assert.Equal(t, string(expectedDigest), base64.StdEncoding.EncodeToString(digest[:]), "Digest doesn't match")
})
t.Run("Basic digest on valid manifest with no excludes", func(t *testing.T) {
bundle, expectedDigest, err := testutil.GivenPod("testdata/pod_valid.yaml")
assert.NoError(t, err)
annotations := bundle.GetAnnotations()
delete(annotations, EksaDomain.Name+"/excludes")
digest, _, err := GetDigest(bundle, EksaDomain)
if err != nil {
t.Error(err)
}
assert.Equal(t, expectedDigest, base64.StdEncoding.EncodeToString(digest[:]), "Digest doesn't match")
})
t.Run("Getting digest on manifest with invalid metadata fails", func(t *testing.T) {
bundle, _ := testutil.GivenPackageBundle("testdata/packagebundle_valid.yaml")
annotations := bundle.GetAnnotations()
annotations[EksaDomain.Name+"/"+ExcludesAnnotation] = "X"
digest, _, err := GetDigest(bundle, EksaDomain)
var b64error base64.CorruptInputError = 0
assert.ErrorIs(t, err, b64error)
assert.Equal(t, digest, [32]byte{})
})
}
| 233 |
eks-anywhere-packages | aws | Go | package testutil
import (
"github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/file"
)
func givenFile(filename string, config file.KindAccessor) error {
reader := file.NewFileReader(filename)
err := reader.Initialize(config)
if err != nil {
return err
}
return reader.Parse(config)
}
func GivenPackage(fileName string) (*v1alpha1.Package, error) {
config := &v1alpha1.Package{}
err := givenFile(fileName, config)
return config, err
}
func GivenPackageBundle(filename string) (*v1alpha1.PackageBundle, error) {
config := &v1alpha1.PackageBundle{}
reader := file.NewFileReader(filename + ".signed")
initError := reader.Initialize(config)
if initError != nil {
return nil, initError
}
actual := reader.Parse(config)
if actual != nil {
return nil, actual
}
return config, nil
}
func GivenBundleController(fileName string) (*v1alpha1.PackageBundleController, error) {
config := &v1alpha1.PackageBundleController{}
err := givenFile(fileName, config)
return config, err
}
| 42 |
eks-anywhere-packages | aws | Go | package testutil
import (
"os"
"path/filepath"
v1 "k8s.io/api/core/v1"
"sigs.k8s.io/yaml"
)
func GivenPod(filename string) (*v1.Pod, string, error) {
content, err := os.ReadFile(filepath.Clean(filename) + ".signed")
if err != nil {
return nil, "", err
}
pod := &v1.Pod{}
err = yaml.UnmarshalStrict(content, pod)
if err != nil {
return nil, "", err
}
digest, err := os.ReadFile(filepath.Clean(filename) + ".digest")
if err != nil {
return nil, "", err
}
return pod, string(digest), nil
}
| 27 |
eks-anywhere-packages | aws | Go | package utils
func Map[T, O any](in []T, mapper func(T) O) []O {
out := make([]O, len(in))
for i, v := range in {
out[i] = mapper(v)
}
return out
}
| 10 |
eks-anywhere-packages | aws | Go | // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package webhook
import (
"context"
"fmt"
"net/http"
admissionv1 "k8s.io/api/admission/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/rest"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/webhook"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
"github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/authenticator"
)
type activeBundleValidator struct {
Client client.Client
Config *rest.Config
decoder *admission.Decoder
tcc authenticator.TargetClusterClient
}
func InitPackageBundleControllerValidator(mgr ctrl.Manager) error {
tcc := authenticator.NewTargetClusterClient(mgr.GetLogger(), mgr.GetConfig(), mgr.GetClient())
mgr.GetWebhookServer().
Register("/validate-packages-eks-amazonaws-com-v1alpha1-packagebundlecontroller",
&webhook.Admission{Handler: &activeBundleValidator{
Client: mgr.GetClient(),
Config: mgr.GetConfig(),
tcc: tcc,
}})
return nil
}
func (v *activeBundleValidator) Handle(ctx context.Context, req admission.Request) admission.Response {
pbc := &v1alpha1.PackageBundleController{}
err := v.decoder.Decode(req, pbc)
if err != nil {
return admission.Errored(http.StatusInternalServerError,
fmt.Errorf("decoding request: %w", err))
}
bundles := &v1alpha1.PackageBundleList{}
err = v.Client.List(ctx, bundles, &client.ListOptions{Namespace: v1alpha1.PackageNamespace})
if err != nil {
return admission.Errored(http.StatusInternalServerError,
fmt.Errorf("listing package bundles: %w", err))
}
resp, err := v.handleInner(ctx, pbc, bundles)
if err != nil {
return admission.Errored(http.StatusInternalServerError, err)
}
return *resp
}
func (v *activeBundleValidator) handleInner(ctx context.Context, pbc *v1alpha1.PackageBundleController, bundles *v1alpha1.PackageBundleList) (
*admission.Response, error) {
if pbc.Spec.ActiveBundle == "" {
resp := &admission.Response{
AdmissionResponse: admissionv1.AdmissionResponse{
Allowed: true,
},
}
return resp, nil
}
var found bool
var theBundle v1alpha1.PackageBundle
for _, b := range bundles.Items {
if b.Name == pbc.Spec.ActiveBundle {
theBundle = b
found = true
break
}
}
if !found {
reason := fmt.Sprintf("activeBundle %q not present on cluster", pbc.Spec.ActiveBundle)
resp := &admission.Response{
AdmissionResponse: admissionv1.AdmissionResponse{
Allowed: false,
Result: &metav1.Status{
Status: metav1.StatusFailure,
Code: http.StatusBadRequest,
Message: reason,
Reason: metav1.StatusReason(reason),
},
},
}
return resp, nil
}
info, err := v.tcc.GetServerVersion(ctx, pbc.Name)
if err != nil {
return nil, fmt.Errorf("getting server version for %s: %w", pbc.Name, err)
}
matches, err := theBundle.KubeVersionMatches(info)
if err != nil {
return nil, fmt.Errorf("listing package bundles: %w", err)
}
if !matches {
reason := fmt.Sprintf("kuberneetes version v%s-%s does not match %s", info.Major, info.Minor, pbc.Spec.ActiveBundle)
resp := &admission.Response{
AdmissionResponse: admissionv1.AdmissionResponse{
Allowed: false,
Result: &metav1.Status{
Status: metav1.StatusFailure,
Code: http.StatusBadRequest,
Message: reason,
Reason: metav1.StatusReason(reason),
},
},
}
return resp, nil
}
resp := &admission.Response{
AdmissionResponse: admissionv1.AdmissionResponse{
Allowed: true,
},
}
return resp, nil
}
var _ admission.DecoderInjector = (*activeBundleValidator)(nil)
// InjectDecoder injects the decoder.
func (v *activeBundleValidator) InjectDecoder(d *admission.Decoder) error {
v.decoder = d
return nil
}
| 155 |
eks-anywhere-packages | aws | Go | // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package webhook
import (
"context"
"encoding/json"
"fmt"
"log"
"testing"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
admissionv1 "k8s.io/api/admission/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/version"
"sigs.k8s.io/controller-runtime/pkg/client"
clientfake "sigs.k8s.io/controller-runtime/pkg/client/fake"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
"github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/authenticator/mocks"
)
func TestHandleInner(t *testing.T) {
ctx := context.Background()
t.Run("validates successfully", func(t *testing.T) {
tcc := mocks.NewMockTargetClusterClient(gomock.NewController(t))
tcc.EXPECT().GetServerVersion(gomock.Any(), gomock.Any()).Return(&version.Info{Major: "1", Minor: "21"}, nil)
v := &activeBundleValidator{
tcc: tcc,
}
pbc := &v1alpha1.PackageBundleController{
Spec: v1alpha1.PackageBundleControllerSpec{
ActiveBundle: "v1-21-1001",
},
}
bundles := &v1alpha1.PackageBundleList{
Items: []v1alpha1.PackageBundle{
{
TypeMeta: metav1.TypeMeta{},
ObjectMeta: metav1.ObjectMeta{
Name: "v1-21-1001",
},
Spec: v1alpha1.PackageBundleSpec{},
Status: v1alpha1.PackageBundleStatus{},
},
},
}
resp, err := v.handleInner(ctx, pbc, bundles)
if assert.NoError(t, err) {
assert.NotNil(t, resp)
assert.True(t, resp.AdmissionResponse.Allowed)
}
})
t.Run("invalidates successfully", func(t *testing.T) {
tcc := mocks.NewMockTargetClusterClient(gomock.NewController(t))
tcc.EXPECT().GetServerVersion(gomock.Any(), gomock.Any()).Return(&version.Info{Major: "1", Minor: "20"}, nil)
v := &activeBundleValidator{
tcc: tcc,
}
pbc := &v1alpha1.PackageBundleController{
Spec: v1alpha1.PackageBundleControllerSpec{
ActiveBundle: "v1-21-1001",
},
}
bundles := &v1alpha1.PackageBundleList{
Items: []v1alpha1.PackageBundle{
{
TypeMeta: metav1.TypeMeta{},
ObjectMeta: metav1.ObjectMeta{
Name: "v1-21-1001",
},
Spec: v1alpha1.PackageBundleSpec{},
Status: v1alpha1.PackageBundleStatus{},
},
},
}
resp, err := v.handleInner(ctx, pbc, bundles)
if assert.NoError(t, err) {
assert.NotNil(t, resp)
assert.False(t, resp.AdmissionResponse.Allowed)
}
})
t.Run("handles decoder errors", func(t *testing.T) {
v := &activeBundleValidator{}
req := admission.Request{
AdmissionRequest: admissionv1.AdmissionRequest{
Object: runtime.RawExtension{
Raw: nil,
},
},
}
resp := v.Handle(ctx, req)
assert.False(t, resp.Allowed)
assert.Contains(t, resp.Result.Message, "decoding request")
})
t.Run("handles list errors", func(t *testing.T) {
pbc := &v1alpha1.PackageBundleController{
Spec: v1alpha1.PackageBundleControllerSpec{
ActiveBundle: "v1-21-1001",
},
Status: v1alpha1.PackageBundleControllerStatus{},
}
pbcBytes, err := json.Marshal(pbc)
require.NoError(t, err)
scheme := runtime.NewScheme()
require.NoError(t, v1alpha1.AddToScheme(scheme))
decoder, err := admission.NewDecoder(scheme)
require.NoError(t, err)
v := &activeBundleValidator{
decoder: decoder,
Client: newFakeClient(scheme),
}
req := admission.Request{
AdmissionRequest: admissionv1.AdmissionRequest{
Object: runtime.RawExtension{
Raw: pbcBytes,
},
},
}
resp := v.Handle(ctx, req)
assert.False(t, resp.Allowed)
assert.Contains(t, resp.Result.Message, "listing package bundles: testing error")
})
t.Run("rejects unknown bundle names", func(t *testing.T) {
v := &activeBundleValidator{}
pbc := &v1alpha1.PackageBundleController{
Spec: v1alpha1.PackageBundleControllerSpec{
ActiveBundle: "v1-21-1002",
},
}
bundles := &v1alpha1.PackageBundleList{
Items: []v1alpha1.PackageBundle{
{
TypeMeta: metav1.TypeMeta{},
ObjectMeta: metav1.ObjectMeta{
Name: "v1-21-1001",
},
Spec: v1alpha1.PackageBundleSpec{},
Status: v1alpha1.PackageBundleStatus{},
},
},
}
resp, err := v.handleInner(ctx, pbc, bundles)
if assert.NoError(t, err) {
assert.False(t, resp.AdmissionResponse.Allowed)
assert.Equal(t, metav1.StatusFailure, resp.AdmissionResponse.Result.Status)
assert.Equal(t, "activeBundle \"v1-21-1002\" not present on cluster", string(resp.AdmissionResponse.Result.Reason))
}
})
}
//
// Test helpers
//
type fakeClient struct {
client.WithWatch
}
//var _ client.WithWatch = (*fakeClient)(nil)
func newFakeClient(scheme *runtime.Scheme) *fakeClient {
fake := clientfake.NewClientBuilder().WithScheme(scheme).Build()
return &fakeClient{
WithWatch: fake,
}
}
func (c *fakeClient) List(ctx context.Context,
obj client.ObjectList, opts ...client.ListOption) error {
log.Printf("list has been called")
return fmt.Errorf("testing error")
}
| 196 |
eks-anywhere-packages | aws | Go | // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package webhook
import (
"context"
"encoding/base64"
"fmt"
"net/http"
"os"
"github.com/go-logr/logr"
admissionv1 "k8s.io/api/admission/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/webhook"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
"github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/bundle"
"github.com/aws/eks-anywhere-packages/pkg/signature"
)
const (
PublicKeyEnvVar = "EKSA_PUBLIC_KEY"
)
type packageBundleValidator struct {
Client client.Client
BundleClient bundle.Client
decoder *admission.Decoder
log logr.Logger
}
func NewPackageBundleValidator(mgr ctrl.Manager) packageBundleValidator {
client := mgr.GetClient()
return packageBundleValidator{
Client: client,
BundleClient: bundle.NewManagerClient(client),
log: mgr.GetLogger().WithName("webhook"),
}
}
func InitPackageBundleValidator(mgr ctrl.Manager) error {
handler := NewPackageBundleValidator(mgr)
mgr.GetWebhookServer().
Register("/validate-packages-eks-amazonaws-com-v1alpha1-packagebundle",
&webhook.Admission{Handler: &handler})
return nil
}
func (v *packageBundleValidator) Handle(_ context.Context, request admission.Request) admission.Response {
pb := &v1alpha1.PackageBundle{}
err := v.decoder.Decode(request, pb)
if err != nil {
return admission.Errored(http.StatusInternalServerError,
fmt.Errorf("decoding request: %w", err))
}
err = v.isPackageBundleValid(pb)
resp := &admission.Response{
AdmissionResponse: admissionv1.AdmissionResponse{Allowed: err == nil},
}
if err != nil {
reason := fmt.Sprintf("package %s failed validation with error: %v", pb.Name, err.Error())
resp.AdmissionResponse.Result = &metav1.Status{
Status: metav1.StatusFailure,
Code: http.StatusBadRequest,
Message: reason,
Reason: metav1.StatusReason(reason),
}
}
return *resp
}
func (v *packageBundleValidator) isPackageBundleValid(pb *v1alpha1.PackageBundle) error {
if !pb.IsValidVersion() {
v.log.Info("Invalid bundle name (should be in the format vx-xx-xxxx where x is a digit): " + pb.Name)
return fmt.Errorf("Invalid bundle name (should be in the format vx-xx-xxxx where x is a digit): " + pb.Name)
}
keyOverride := os.Getenv(PublicKeyEnvVar)
domain := signature.EksaDomain
if keyOverride != "" {
domain = signature.Domain{Name: signature.DomainName, Pubkey: keyOverride}
}
valid, digest, yml, err := signature.ValidateSignature(pb, domain)
if err != nil {
return err
}
if !valid {
v.log.Info("Invalid signature", "Error", err, "Digest", base64.StdEncoding.EncodeToString(digest[:]), "Manifest", string(yml))
return fmt.Errorf("The signature is invalid for the configured public key: " + domain.Pubkey)
}
return nil
}
// InjectDecoder injects the decoder.
func (v *packageBundleValidator) InjectDecoder(d *admission.Decoder) error {
v.decoder = d
return nil
}
| 119 |
eks-anywhere-packages | aws | Go | package webhook
import (
"testing"
"github.com/go-logr/logr"
"github.com/golang/mock/gomock"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/controllers/mocks"
"github.com/aws/eks-anywhere-packages/pkg/testutil"
)
func TestBundleValidate(t *testing.T) {
t.Setenv("EKSA_PUBLIC_KEY", "")
mockManager := mocks.NewMockManager(gomock.NewController(t))
mockManager.EXPECT().GetClient().Return(nil)
mockManager.EXPECT().GetLogger().Return(logr.Discard())
sut := NewPackageBundleValidator(mockManager)
t.Run("missing signature", func(t *testing.T) {
myBundle := v1alpha1.PackageBundle{ObjectMeta: metav1.ObjectMeta{Name: "v1-21-003"}}
err := sut.isPackageBundleValid(&myBundle)
assert.EqualError(t, err, "Missing signature")
})
t.Run("invalid name", func(t *testing.T) {
myBundle := v1alpha1.PackageBundle{ObjectMeta: metav1.ObjectMeta{Name: "kevin-morby"}}
err := sut.isPackageBundleValid(&myBundle)
assert.EqualError(t, err, "Invalid bundle name (should be in the format vx-xx-xxxx where x is a digit): kevin-morby")
})
t.Run("invalid key", func(t *testing.T) {
t.Setenv(PublicKeyEnvVar, "asdf")
myBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
err = sut.isPackageBundleValid(myBundle)
assert.EqualError(t, err, "unable parse the public key (not PKIX)")
})
t.Run("empty env", func(t *testing.T) {
t.Setenv(PublicKeyEnvVar, "")
myBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
err = sut.isPackageBundleValid(myBundle)
assert.EqualError(t, err, "The signature is invalid for the configured public key: MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnP0Yo+ZxzPUEfohcG3bbJ8987UT4f0tj+XVBjS/s35wkfjrxTKrVZQpz3ta3zi5ZlgXzd7a20B1U1Py/TtPsxw==")
})
t.Run("env override", func(t *testing.T) {
t.Setenv(PublicKeyEnvVar, "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvME/v61IfA4ulmgdF10Ae/WCRqtXvrUtF+0nu0dbdP36u3He4GRepYdQGCmbPe0463yAABZs01/Vv/v52ktlmg==")
myBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
err = sut.isPackageBundleValid(myBundle)
assert.Nil(t, err)
})
}
| 70 |
eks-anywhere-packages | aws | Go | // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package webhook
import (
"bytes"
"context"
"fmt"
"net/http"
"os"
"github.com/xeipuuv/gojsonschema"
admissionv1 "k8s.io/api/admission/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/webhook"
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
"sigs.k8s.io/yaml"
"github.com/aws/eks-anywhere-packages/api/v1alpha1"
"github.com/aws/eks-anywhere-packages/pkg/bundle"
)
type packageValidator struct {
Client client.Client
BundleClient bundle.Client
decoder *admission.Decoder
}
func InitPackageValidator(mgr ctrl.Manager) error {
mgr.GetWebhookServer().
Register("/validate-packages-eks-amazonaws-com-v1alpha1-package",
&webhook.Admission{Handler: &packageValidator{
Client: mgr.GetClient(),
BundleClient: bundle.NewManagerClient(mgr.GetClient()),
}})
return nil
}
func (v *packageValidator) Handle(ctx context.Context, request admission.Request) admission.Response {
p := &v1alpha1.Package{}
err := v.decoder.Decode(request, p)
if err != nil {
return admission.Errored(http.StatusInternalServerError,
fmt.Errorf("decoding request: %w", err))
}
if p.Annotations["anywhere.eks.aws.com/internal"] == "true" {
return admission.Response{AdmissionResponse: admissionv1.AdmissionResponse{Allowed: true}}
}
clusterName := p.GetClusterName()
if clusterName == "" {
clusterName = os.Getenv("CLUSTER_NAME")
}
activeBundle, err := v.BundleClient.GetActiveBundle(ctx, clusterName)
if err != nil {
return admission.Errored(http.StatusInternalServerError, fmt.Errorf("getting PackageBundle: %v", err))
}
isConfigValid, err := v.isPackageValid(p, activeBundle)
resp := &admission.Response{
AdmissionResponse: admissionv1.AdmissionResponse{Allowed: isConfigValid},
}
if !isConfigValid {
reason := fmt.Sprintf("package %s failed validation with error: %v", p.Name, err)
resp.AdmissionResponse.Result = &metav1.Status{
Status: metav1.StatusFailure,
Code: http.StatusBadRequest,
Message: reason,
Reason: metav1.StatusReason(reason),
}
}
return *resp
}
func (v *packageValidator) isPackageValid(p *v1alpha1.Package, activeBundle *v1alpha1.PackageBundle) (bool, error) {
packageInBundle, err := activeBundle.FindPackage(p.Spec.PackageName)
if err != nil {
return false, err
}
version := p.Spec.PackageVersion
if version == "" {
version = v1alpha1.Latest
}
packageVersion, err := activeBundle.FindVersion(packageInBundle, version)
if err != nil {
return false, err
}
if packageInBundle.WorkloadOnly && !p.IsInstalledOnWorkload() {
return false, fmt.Errorf("package %s should only be installed on a workload cluster", p.Name)
}
jsonSchema, err := packageInBundle.GetJsonSchema(&packageVersion)
if err != nil {
return false, err
}
result, err := validatePackage(p, jsonSchema)
if err != nil {
return false, fmt.Errorf(err.Error())
}
if p.Status.Spec.TargetNamespace != "" && p.Status.Spec.TargetNamespace != p.Spec.TargetNamespace {
return false, fmt.Errorf("package %s targetNamespace is immutable", p.Name)
}
b := new(bytes.Buffer)
if !result.Valid() {
for _, e := range result.Errors() {
fmt.Fprintf(b, "- %s\n", e)
}
return false, fmt.Errorf("error validating configurations %s", b.String())
}
return true, nil
}
func validatePackage(p *v1alpha1.Package, jsonSchema []byte) (*gojsonschema.Result, error) {
sl := gojsonschema.NewSchemaLoader()
loader := gojsonschema.NewStringLoader(string(jsonSchema))
schema, err := sl.Compile(loader)
if err != nil {
return nil, fmt.Errorf("error compiling schema %v", err)
}
packageConfigBytes, err := yaml.YAMLToJSON([]byte(p.Spec.Config))
if err != nil {
return nil, fmt.Errorf("error converting package configurations to yaml %v", err)
}
packageConfigString := string(packageConfigBytes)
if p.Spec.Config == "" {
packageConfigString = "{}"
}
configToValidate := gojsonschema.NewStringLoader(packageConfigString)
return schema.Validate(configToValidate)
}
// InjectDecoder injects the decoder.
func (v *packageValidator) InjectDecoder(d *admission.Decoder) error {
v.decoder = d
return nil
}
| 167 |
eks-anywhere-packages | aws | Go | package webhook
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/aws/eks-anywhere-packages/pkg/testutil"
)
func TestPackageValidate(t *testing.T) {
t.Run("valid package", func(t *testing.T) {
activeBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
myPackage, err := testutil.GivenPackage("../../api/testdata/package_webhook_valid_config.yaml")
require.Nil(t, err)
validator := packageValidator{}
result, err := validator.isPackageValid(myPackage, activeBundle)
assert.True(t, result)
assert.Nil(t, err)
})
t.Run("invalid package config", func(t *testing.T) {
activeBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
myPackage, err := testutil.GivenPackage("../../api/testdata/package_webhook_invalid_config.yaml")
require.Nil(t, err)
validator := packageValidator{}
result, err := validator.isPackageValid(myPackage, activeBundle)
assert.False(t, result)
assert.EqualError(t, err, "error validating configurations - (root): Additional property fakeConfig is not allowed\n")
})
t.Run("invalid package config type", func(t *testing.T) {
activeBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
myPackage, err := testutil.GivenPackage("../../api/testdata/package_webhook_invalid_type.yaml")
require.Nil(t, err)
validator := packageValidator{}
result, err := validator.isPackageValid(myPackage, activeBundle)
assert.False(t, result)
assert.EqualError(t, err, "error validating configurations - title: Invalid type. Expected: string, given: integer\n")
})
t.Run("status targetNamespace not set", func(t *testing.T) {
activeBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
myPackage, err := testutil.GivenPackage("../../api/testdata/package_webhook_valid_config.yaml")
require.Nil(t, err)
myPackage.Spec.TargetNamespace = "default"
myPackage.Status.Spec.TargetNamespace = ""
validator := packageValidator{}
result, err := validator.isPackageValid(myPackage, activeBundle)
assert.True(t, result)
assert.Nil(t, err)
})
t.Run("status targetNamespace same", func(t *testing.T) {
activeBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
myPackage, err := testutil.GivenPackage("../../api/testdata/package_webhook_valid_config.yaml")
require.Nil(t, err)
myPackage.Spec.TargetNamespace = "default"
myPackage.Status.Spec.TargetNamespace = "default"
validator := packageValidator{}
result, err := validator.isPackageValid(myPackage, activeBundle)
assert.True(t, result)
assert.Nil(t, err)
})
t.Run("status targetNamespace not same", func(t *testing.T) {
activeBundle, err := testutil.GivenPackageBundle("../../api/testdata/bundle_one.yaml")
require.Nil(t, err)
myPackage, err := testutil.GivenPackage("../../api/testdata/package_webhook_valid_config.yaml")
require.Nil(t, err)
myPackage.Spec.TargetNamespace = "new-namespace"
myPackage.Status.Spec.TargetNamespace = "default"
validator := packageValidator{}
result, err := validator.isPackageValid(myPackage, activeBundle)
assert.False(t, result)
assert.EqualError(t, err, "package my-hello-eks-anywhere targetNamespace is immutable")
})
}
| 98 |
eks-anywhere-prow-jobs | aws | Go | package main
import (
_ "embed"
"fmt"
"io/ioutil"
"os"
"os/exec"
"path/filepath"
"strings"
"github.com/aws/eks-anywhere-prow-jobs/templater/jobs"
"github.com/aws/eks-distro-prow-jobs/templater/jobs/types"
"github.com/aws/eks-distro-prow-jobs/templater/jobs/utils"
)
var (
jobsFolder = "jobs"
orgsSupported = []string{"aws"}
jobTypes = []string{"periodic", "postsubmit", "presubmit"}
)
//go:embed templates/presubmits.yaml
var presubmitTemplate string
//go:embed templates/postsubmits.yaml
var postsubmitTemplate string
//go:embed templates/periodics.yaml
var periodicTemplate string
//go:embed templates/warning.txt
var editWarning string
//go:generate cp ../BUILDER_BASE_TAG_FILE ./BUILDER_BASE_TAG_FILE
//go:embed BUILDER_BASE_TAG_FILE
var builderBaseTag string
var buildkitImageTag = "v0.10.5-rootless"
func main() {
jobsFolderPath, err := getJobsFolderPath()
if err != nil {
fmt.Printf("Error getting jobs folder path: %v", err)
os.Exit(1)
}
for _, org := range orgsSupported {
if err = os.RemoveAll(filepath.Join(jobsFolderPath, org)); err != nil {
fmt.Printf("Error removing jobs folder path: %v", err)
os.Exit(1)
}
}
for _, jobType := range jobTypes {
jobList, err := jobs.GetJobList(jobType)
if err != nil {
fmt.Printf("Error getting job list: %v\n", err)
os.Exit(1)
}
template, err := useTemplate(jobType)
if err != nil {
fmt.Printf("Error getting job list: %v\n", err)
os.Exit(1)
}
for repoName, jobConfigs := range jobList {
for fileName, jobConfig := range jobConfigs {
envVars := jobConfig.EnvVars
if jobConfig.UseDockerBuildX {
envVars = append(envVars, &types.EnvVar{Name: "BUILDKITD_IMAGE", Value: "moby/buildkit:" + buildkitImageTag})
envVars = append(envVars, &types.EnvVar{Name: "USE_BUILDX", Value: "true"})
}
cluster, bucket, serviceAccountName := clusterDetails(jobType, jobConfig.Cluster, jobConfig.Bucket, jobConfig.ServiceAccountName)
data := map[string]interface{}{
"architecture": jobConfig.Architecture,
"repoName": repoName,
"prowjobName": jobConfig.JobName,
"runIfChanged": jobConfig.RunIfChanged,
"skipIfOnlyChanged": jobConfig.SkipIfOnlyChanged,
"branches": jobConfig.Branches,
"cronExpression": jobConfig.CronExpression,
"maxConcurrency": jobConfig.MaxConcurrency,
"timeout": jobConfig.Timeout,
"extraRefs": jobConfig.ExtraRefs,
"imageBuild": jobConfig.ImageBuild,
"useDockerBuildX": jobConfig.UseDockerBuildX,
"prCreation": jobConfig.PRCreation,
"runtimeImage": jobConfig.RuntimeImage,
"localRegistry": jobConfig.LocalRegistry,
"serviceAccountName": serviceAccountName,
"command": strings.Join(jobConfig.Commands, "\n&&\n"),
"builderBaseTag": builderBaseTag,
"buildkitImageTag": buildkitImageTag,
"resources": jobConfig.Resources,
"envVars": envVars,
"volumes": jobConfig.Volumes,
"volumeMounts": jobConfig.VolumeMounts,
"editWarning": editWarning,
"automountServiceAccountToken": jobConfig.AutomountServiceAccountToken,
"cluster": cluster,
"bucket": bucket,
"projectPath": jobConfig.ProjectPath,
"diskUsage": true,
}
err := GenerateProwjob(fileName, template, data)
if err != nil {
fmt.Printf("Error generating Prowjob %s: %v\n", fileName, err)
os.Exit(1)
}
}
}
}
}
func GenerateProwjob(prowjobFileName, templateContent string, data map[string]interface{}) error {
bytes, err := utils.ExecuteTemplate(templateContent, data)
if err != nil {
return fmt.Errorf("error executing template: %v", err)
}
jobsFolderPath, err := getJobsFolderPath()
if err != nil {
return fmt.Errorf("error getting jobs folder path: %v", err)
}
prowjobPath := filepath.Join(jobsFolderPath, data["repoName"].(string), prowjobFileName)
if err = os.MkdirAll(filepath.Dir(prowjobPath), 0o755); err != nil {
return fmt.Errorf("error creating Prowjob directory: %v", err)
}
if err = ioutil.WriteFile(prowjobPath, bytes, 0o644); err != nil {
return fmt.Errorf("error writing to path %s: %v", prowjobPath, err)
}
return nil
}
func getJobsFolderPath() (string, error) {
gitRootOutput, err := exec.Command("git", "rev-parse", "--show-toplevel").Output()
if err != nil {
return "", fmt.Errorf("error running the git command: %v", err)
}
gitRoot := strings.Fields(string(gitRootOutput))[0]
return filepath.Join(gitRoot, jobsFolder), nil
}
func useTemplate(jobType string) (string, error) {
switch jobType {
case "periodic":
return periodicTemplate, nil
case "postsubmit":
return postsubmitTemplate, nil
case "presubmit":
return presubmitTemplate, nil
default:
return "", fmt.Errorf("Unsupported job type: %s", jobType)
}
}
func clusterDetails(jobType string, cluster string, bucket string, serviceAccountName string) (string, string, string) {
if jobType == "presubmit" && len(cluster) == 0 {
cluster = "prow-presubmits-cluster"
bucket = "s3://prowpresubmitsdataclusterstack-prowbucket7c73355c-vfwwxd2eb4gp"
serviceAccountName = "presubmits-build-account"
}
if (jobType == "postsubmit" || jobType == "periodic") && len(cluster) == 0 {
cluster = "prow-postsubmits-cluster"
bucket = "s3://prowdataclusterstack-316434458-prowbucket7c73355c-1n9f9v93wpjcm"
serviceAccountName = "postsubmits-build-account"
}
return cluster, bucket, serviceAccountName
}
| 181 |
eks-anywhere-prow-jobs | aws | Go | package jobs
import (
"fmt"
"github.com/aws/eks-distro-prow-jobs/templater/jobs/types"
"github.com/aws/eks-distro-prow-jobs/templater/jobs/utils"
)
func GetJobList(jobType string) (map[string]map[string]types.JobConfig, error) {
switch jobType {
case "periodic":
repos := []string{"eks-anywhere", "eks-anywhere-build-tooling"}
periodicsList, err := utils.GetJobsByType(repos, "periodic")
if err != nil {
return nil, fmt.Errorf("error getting periodic list:%v", err)
}
return periodicsList, nil
case "postsubmit":
repos := []string{"eks-anywhere"}
postsubmitsList, err := utils.GetJobsByType(repos, "postsubmit")
if err != nil {
return nil, fmt.Errorf("error getting postsubmits list:%v", err)
}
return postsubmitsList, nil
case "presubmit":
repos := []string{"eks-anywhere", "eks-anywhere-build-tooling", "eks-anywhere-packages", "eks-anywhere-prow-jobs"}
presubmitsList, err := utils.GetJobsByType(repos, "presubmit")
if err != nil {
return nil, fmt.Errorf("error getting presubmits list:%v", err)
}
return presubmitsList, nil
default:
return nil, fmt.Errorf("Unsupported job type: %s", jobType)
}
}
| 37 |
eks-distro | aws | Go | package main
import (
"flag"
"fmt"
"io"
"log"
"os"
"os/exec"
"path/filepath"
"regexp"
"strings"
)
var (
outputStream io.Writer = os.Stdout
errStream io.Writer = os.Stderr
)
type Command struct {
releaseBranch string
releaseVariant string
gitRoot string
release string
artifactBucket string
makeTarget string
makeArgs []string
dryRun bool
}
func (c *Command) buildProject(projectPath string) error {
commandArgs := []string{
"-C",
filepath.Join(c.gitRoot, "projects", projectPath),
}
allMakeTargets := strings.Split(c.makeTarget, ",")
commandArgs = append(commandArgs, allMakeTargets...)
commandArgs = append(commandArgs, c.makeArgs...)
cmd := exec.Command("make", commandArgs...)
log.Printf("Executing: %s", strings.Join(cmd.Args, " "))
cmd.Stdout = outputStream
cmd.Stderr = errStream
if !c.dryRun {
err := cmd.Run()
if err != nil {
return fmt.Errorf("Error running make: %v", err)
}
}
return nil
}
func main() {
target := flag.String("target", "release", "Make target")
releaseBranch := flag.String("release-branch", "1-19", "Release branch to test")
releaseVariant := flag.String("release-variant", "", "Release variant to test")
release := flag.String("release", "1", "Release to test")
region := flag.String("region", "us-west-2", "AWS region to use")
accountId := flag.String("account-id", "", "AWS Account ID to use")
imageRepo := flag.String("image-repo", "", "Container image repository")
artifactBucket := flag.String("artifact-bucket", "", "S3 bucket for artifacts")
gitRoot := flag.String("git-root", "", "Git root directory")
dryRun := flag.Bool("dry-run", false, "Echo out commands, but don't run them")
rebuildAll := flag.Bool("rebuild-all", false, "Rebuild all projects, regardless of changes present")
buildKubeFirst := flag.Bool("build-kubernetes-first", true, "Build kubernetes projects first then other components")
flag.Parse()
log.Printf("Running postsubmit - dry-run: %t", *dryRun)
c := &Command{
releaseBranch: *releaseBranch,
releaseVariant: *releaseVariant,
release: *release,
artifactBucket: *artifactBucket,
gitRoot: *gitRoot,
makeTarget: *target,
dryRun: *dryRun,
}
if c.gitRoot == "" {
gitRootOutput, err := exec.Command("git", "rev-parse", "--show-toplevel").Output()
if err != nil {
log.Fatalf("Error running finding git root: %v", err)
}
c.gitRoot = strings.Fields(string(gitRootOutput))[0]
}
c.makeArgs = []string{
fmt.Sprintf("RELEASE_BRANCH=%s", c.releaseBranch),
fmt.Sprintf("RELEASE=%s", c.release),
fmt.Sprintf("AWS_REGION=%s", *region),
fmt.Sprintf("AWS_ACCOUNT_ID=%s", *accountId),
fmt.Sprintf("IMAGE_REPO=%s", *imageRepo),
}
cmd := exec.Command("git", "-C", c.gitRoot, "diff", "--name-only", "HEAD^", "HEAD")
log.Printf("Executing command: %s", strings.Join(cmd.Args, " "))
gitDiffOutput, err := cmd.Output()
if err != nil {
log.Fatalf("error running git diff: %v\n%s", err, string(gitDiffOutput))
}
filesChanged := strings.Fields(string(gitDiffOutput))
allChanged := false
buildOrderKube := []string{
"kubernetes/release",
"kubernetes/kubernetes",
"kubernetes/cloud-provider-aws",
}
buildOrder := []string{
"containernetworking/plugins",
"coredns/coredns",
"etcd-io/etcd",
"kubernetes-sigs/aws-iam-authenticator",
"kubernetes-sigs/metrics-server",
"kubernetes-csi/external-attacher",
"kubernetes-csi/external-resizer",
"kubernetes-csi/livenessprobe",
"kubernetes-csi/node-driver-registrar",
"kubernetes-csi/external-snapshotter",
"kubernetes-csi/external-provisioner",
}
if *buildKubeFirst {
buildOrder = append(buildOrderKube[:], buildOrder...)
} else {
buildOrder = append(buildOrder[:], buildOrderKube...)
}
type changedStruct struct {
changed bool
}
projects := make(map[string]*changedStruct)
for _, projectPath := range buildOrder {
projects[projectPath] = &changedStruct{}
}
if *rebuildAll {
allChanged = true
} else {
for _, file := range filesChanged {
for projectPath := range projects {
if strings.Contains(file, projectPath) {
projects[projectPath].changed = true
}
}
r := regexp.MustCompile("^Makefile$|^Common.mk$|cmd/main_postsubmit.go|EKS_DISTRO_.*_TAG_FILE|^release/.*|^build/lib/.*")
if r.MatchString(file) {
allChanged = true
}
}
}
for _, projectPath := range buildOrder {
if projects[projectPath].changed || allChanged {
err = c.buildProject(projectPath)
if err != nil {
log.Fatalf("error building %s: %v", projectPath, err)
}
}
}
}
| 164 |
eks-distro | aws | Go | package main
import (
"fmt"
"log"
"github.com/aws/eks-distro/cmd/release/utils/projects"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
// Prints GitTag and Golang versions for each project and release branch.
// Uses local values, which may differ from what's in the upstream EKS-D repo
// or the versions in the current releases.
func main() {
eksdProjects, err := projects.GetProjects()
if err != nil {
log.Fatalf("getting projects: %v", err)
}
releaseBranches, err := values.GetSupportedReleaseBranchesStrings()
if err != nil {
log.Fatalf("getting suppoerted release branches: %v", err)
}
for _, project := range eksdProjects {
fmt.Printf("\n%s / %s\n", project.GetOrg(), project.GetRepo())
for _, rb := range releaseBranches {
version, err := project.GetVersion(rb)
if err != nil {
log.Fatalf("getting %s/%s versions for %s: %v", project.GetOrg(), project.GetRepo(), rb, err)
}
fmt.Printf(" ◦ %s ➜ %-10s%s\n", rb, version.GetGitTag(), version.GetGolang())
}
fmt.Printf(" %s/tags\n", project.GetGitHubURL())
}
println()
}
| 38 |
eks-distro | aws | Go | package main
import (
"flag"
"log"
"strconv"
"github.com/aws/eks-distro/cmd/release/docs/existingdocs"
"github.com/aws/eks-distro/cmd/release/docs/newdocs"
"github.com/aws/eks-distro/cmd/release/utils/changetype"
"github.com/aws/eks-distro/cmd/release/utils/git"
"github.com/aws/eks-distro/cmd/release/utils/release"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
const (
changeType = changetype.Docs
firstMinorReleaseNumber = "1"
)
// Generates docs for release. The release MUST already be out, and all upstream changes MUST be pulled down locally.
// Value for 'branch' flag must be provided.
//
// !!! IMPORTANT INFO IF GENERATING DOCS FOR A NEW MINOR RELEASE !!!
//
// All releases for the new minor version must be tagged before running. Since there are no docs commits that are
// associated with them, the prod release commit for each should be tagged. This program assumes this is the case and
// the changelog generation will not work correctly if this is not true.
//
// When the release number is 1 (i.e. this is the first time docs will be added for this minor release), you MUST
// manually do the below changes BEFORE running it. See example https://github.com/aws/eks-distro/pull/2070
// - In the root README.md and under the ## Releases section, look for the previous release's section. It
// should start with ### Kubernetes 1-XX, have an empty line, and then have a three row table. Copy all five
// lines. Paste them just above the lines you copied. ONLY change the minor version in the first line to be
// for the new one. Do not change any other lines, even if they are for the previous minor version. This
// program will handle this.
// - In docs/contents/index.md, look for the section ### Release Version Dependencies. Copy ONLY the previous
// releases header section (i.e. #### EKS-D 1.XX Version Dependencies), paste it above the copied line, and
// change the minor release number to be the new one. Do not add anything other than this line.
//
// TODO: fix the hacky code related to opening PRs and git commands. It is bad, and I am sorry.
func main() {
branch := flag.String("branch", "", "Release branch, e.g. 1-23")
hasManageGitAndPR := flag.Bool("manageGitAndOpenPR", true, "If PR and all git should be done")
hasReleaseAnnouncement := flag.Bool("releaseAnnouncement", true, "If changes in changelog should be generated")
overrideNumber := flag.Int("optionalOverrideNumber", release.InvalidNumberUpperLimit,
"USE WITH CAUTION! Value to force override for number. Any value less than or equal to "+
strconv.Itoa(release.InvalidNumberUpperLimit)+" is considered an indication that the number should not be overridden.")
flag.Parse()
//////////// Create Release ////////////////////////////////////
// The actual release MUST already be out, and all upstream changes MUST be pulled down locally.
r, err := func(overrideNum int, branch *string) (*release.Release, error) {
if overrideNum > release.InvalidNumberUpperLimit {
return release.NewReleaseOverrideNumber(*branch, strconv.Itoa(overrideNum))
} else {
return release.NewRelease(*branch, changeType)
}
}(*overrideNumber, branch)
if err != nil {
log.Fatalf("creating release info for docs: %v", err)
}
//////////// Create Git Manager ////////////////////////////////////
var gm *git.Manager
if *hasManageGitAndPR {
gm, err = git.CreateGitManager(r.Branch(), r.Number(), changeType)
if err != nil {
log.Fatalf("creating new git manager: %v", err)
}
}
//////////// Create new docs ////////////////////////////////////
log.Println("Starting to create new docs")
abandon := abandonFunc(gm)
if r.Number() == firstMinorReleaseNumber {
log.Println("Creating new directory for new minor release")
if _, err := values.MakeNewDirectory(values.GetReleaseBranchDocsDirectory(r)); err != nil {
log.Fatalf("creating new minor release docs directory: %v", err)
}
}
docs, err := newdocs.CreateNewDocsInput(r, *hasReleaseAnnouncement)
if err != nil {
abandon()
log.Fatalf("creating new docs input: %v", err)
}
newDocsDir, err := values.MakeNewDirectory(values.GetReleaseDocsDirectory(r))
if err != nil {
abandon()
log.Fatalf("creating new directory for release docs: %v", err)
}
cleanUpDir := cleanUpDirFunc(gm, *newDocsDir)
if err = newdocs.GenerateNewDocs(docs, *newDocsDir); err != nil {
cleanUpDir()
log.Fatalf("creating new docs: %v", err)
}
if *hasManageGitAndPR {
if err = gm.AddAndCommitDirectory(*newDocsDir); err != nil {
cleanUpDir()
log.Fatalf("adding and committing new docs %q\n%v", newDocsDir, err)
}
}
log.Println("Finished creating new docs\n--------------------------")
//////////// Update existing docs ////////////////////////////////////
log.Println("Starting to update existing new docs")
cleanUp := cleanUpFunc(gm)
var existingDocsUpdateFuncs = map[values.AbsolutePath]func(*release.Release, string) error{
values.IndexPath: existingdocs.UpdateDocsIndex,
values.ReadmePath: existingdocs.UpdateREADME,
}
for ap, updateFunc := range existingDocsUpdateFuncs {
log.Printf("Starting update of %v\n", ap)
if err = updateFunc(r, ap.String()); err != nil {
cleanUp(ap)
log.Fatalf("updating %s: %v", ap, err)
}
if *hasManageGitAndPR {
if err = gm.AddAndCommit(ap); err != nil {
cleanUp(ap)
log.Fatalf("adding and committing %s after changes had been made: %v", ap, err)
}
}
log.Printf("Successfully updated %v\n", ap)
}
log.Println("Finished updating existing docs\n--------------------------")
//////////// Open PR ////////////////////////////////////
if *hasManageGitAndPR {
if err = gm.OpenPR(); err != nil {
log.Fatalf("opening PR: %v", err)
}
}
}
func abandonFunc(gm *git.Manager) func() {
if gm == nil {
return func() {}
}
return func() {
if abandonErr := gm.Abandon(); abandonErr != nil {
log.Printf("encountered error while attempting to abandon branch due to earlier error: %v", abandonErr)
}
}
}
func cleanUpDirFunc(gm *git.Manager, nd values.NewDirectory) func() {
if gm == nil {
return func() {}
}
return func() {
if cleanUpErr := gm.DeleteDirectoryAndAbandonAllChanges(&nd); cleanUpErr != nil {
log.Printf("encountered an error while attemptng to clean up due to earlier error: %v", cleanUpErr)
}
}
}
func cleanUpFunc(gm *git.Manager) func(values.AbsolutePath) {
if gm == nil {
return func(values.AbsolutePath) {}
}
return func(ap values.AbsolutePath) {
cleanUpErrs := gm.RestoreFileAndAbandonAllChanges(ap)
if len(cleanUpErrs) > 0 {
log.Printf("encountered %d error(s) while attemptng to clean up due to earlier error: %v",
len(cleanUpErrs), cleanUpErrs)
}
}
}
| 186 |
eks-distro | aws | Go | package existingdocs
import (
"bytes"
"fmt"
"os"
"time"
"github.com/aws/eks-distro/cmd/release/utils/release"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
var linebreak = []byte("\n")
// UpdateDocsIndex updates the doc's directory index.md file for the current release.
func UpdateDocsIndex(r *release.Release, docsIndexPath string) error {
data, err := os.ReadFile(docsIndexPath)
if err != nil {
return fmt.Errorf("reading doc index file: %w", err)
}
splitData := bytes.Split(data, linebreak)
currLineNumber := 0
// Update 'RELEASE=<number>' if branch is default branch
isDefaultBranch, err := values.IsDefaultReleaseBranch(r.Branch())
if err != nil {
return err
}
if isDefaultBranch {
hasFoundLine := false
linePrefix := []byte("RELEASE=")
expectedPreviousLine := []byte("RELEASE_BRANCH=" + r.Branch())
for i := 1; i < len(splitData); i++ {
if bytes.HasPrefix(splitData[i], linePrefix) && bytes.Equal(splitData[i-1], expectedPreviousLine) {
hasFoundLine = true
currLineNumber = i
break
}
}
if !hasFoundLine {
return fmt.Errorf("updating index file because did not find line %q", expectedPreviousLine)
}
splitData[currLineNumber] = append(linePrefix, []byte(r.Number())...)
}
// Adds a link to index.md for the new release in the section for its release branch.
hasFoundSection := false
sectionHeader := []byte(fmt.Sprintf("#### EKS-D %s Version Dependencies", r.KubernetesMinorVersion()))
for j := currLineNumber; j < len(splitData)-1; j++ {
if bytes.Equal(sectionHeader, splitData[j]) {
currLineNumber = j
hasFoundSection = true
break
}
}
if !hasFoundSection {
return fmt.Errorf("updating index file because did not find section for Version Dependencies")
}
newLine := fmt.Sprintf(`* [%s](releases/%s/%s/index.md) (%s)`, r.Tag(), r.Branch(), r.Number(), getDate())
splitData[currLineNumber] = append(append(splitData[currLineNumber], linebreak...), newLine...)
return os.WriteFile(docsIndexPath, bytes.Join(splitData, linebreak), 0644)
}
func getDate() string {
return time.Now().Format("January 02, 2006")
}
| 69 |
eks-distro | aws | Go | package existingdocs
import (
"bytes"
"fmt"
"os"
"github.com/aws/eks-distro/cmd/release/utils/release"
)
// UpdateREADME updates the README to replace release manifest from previous patch release with the new one.
func UpdateREADME(release *release.Release, readmePath string) error {
data, err := os.ReadFile(readmePath)
if err != nil {
return fmt.Errorf("reading README: %w", err)
}
// Example:
// ### Kubernetes 1-23
//
// | Release | Manifest | Kubernetes Version |
// | --- | --- | --- |
// | 4 | [1-23-eks-4](https://distro.eks.amazonaws.com/kubernetes-1-23/kubernetes-1-23-eks-4.yaml) | v1.23.9 | <- line to change
expectedLine := []byte("### Kubernetes " + release.Branch())
lineToUpdate := []byte(fmt.Sprintf("| %s | [%s](%s) | [%s](%s) |", release.Number(), release.Tag(), release.ManifestURL(), release.KubernetesGitTag(), release.KubernetesURL()))
numberOfLinesBetweenExpectedLineAndLineToUpdate := 4
splitData := bytes.Split(data, linebreak)
for i := 0; i < len(splitData)-numberOfLinesBetweenExpectedLineAndLineToUpdate; i++ {
if bytes.Equal(expectedLine, splitData[i]) {
splitData[i+numberOfLinesBetweenExpectedLineAndLineToUpdate] = lineToUpdate
return os.WriteFile(readmePath, bytes.Join(splitData, linebreak), 0644)
}
}
return fmt.Errorf("finding line (%q) needed to update version tag in %s", expectedLine, readmePath)
}
| 37 |
eks-distro | aws | Go | package newdocs
import (
"fmt"
"io"
"log"
"os"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
// GenerateNewDocs writes to each doc in provided docs.
func GenerateNewDocs(newDocsInput []NewDocInput, docsDir values.NewDirectory) error {
for _, doc := range newDocsInput {
fullFilePath := fmt.Sprint(docsDir.String() + "/" + doc.FileName)
err := writeToNewDoc(doc, fullFilePath)
if err != nil {
return fmt.Errorf("writing to new docs: %w", err)
}
log.Printf("Successfully wrote to %v\n", doc.FileName)
}
return nil
}
func writeToNewDoc(doc NewDocInput, fullFilePath string) error {
docFile, err := os.Create(fullFilePath)
if err != nil {
return fmt.Errorf("creating file %s: %w", fullFilePath, err)
}
docsWriter := io.Writer(docFile)
_, err = doc.TemplateWriter.WriteTo(docsWriter)
if err != nil {
return fmt.Errorf("writing to file %s: %w", fullFilePath, err)
}
if doc.AppendToEnd != nil {
additionalText, appendErr := doc.AppendToEnd()
if appendErr != nil {
closeFile(docFile)
return fmt.Errorf("getting additional text append to file: %w", appendErr)
}
if _, err = docFile.WriteString(additionalText + "\n"); err != nil {
closeFile(docFile)
return fmt.Errorf("appending additional text to file: %w", err)
}
}
closeFile(docFile)
return nil
}
func closeFile(f *os.File) {
if err := f.Close(); err != nil {
log.Printf("Encountered error when attempting to close file: %v\n", err)
}
}
| 57 |
eks-distro | aws | Go | package newdocs
import (
"bytes"
"fmt"
"strconv"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
type NewDocInput struct {
FileName string
TemplateWriter bytes.Buffer
AppendToEnd func() (string, error)
}
type releaseInfo interface {
Tag() string
ManifestURL() string
KubernetesMinorVersion() string
Number() string
}
func CreateNewDocsInput(ri releaseInfo, hasAnnouncement bool) ([]NewDocInput, error) {
changeLogWriter, err := getTemplateWriter(ri, changelogTemplateInput)
if err != nil {
return []NewDocInput{}, fmt.Errorf("getting template writer for changelog: %w", err)
}
indexWriter, err := getTemplateWriter(ri, indexTemplateInput)
if err != nil {
return []NewDocInput{}, fmt.Errorf("getting template writer for index: %w", err)
}
newDocInput := []NewDocInput{
{
FileName: values.GetChangelogFileName(ri),
TemplateWriter: changeLogWriter,
AppendToEnd: getPrInfoForChangelogFunc(ri),
},
{
FileName: values.IndexFileName,
TemplateWriter: indexWriter,
AppendToEnd: getComponentsFromReleaseManifestFunc(ri),
},
}
if hasAnnouncement {
releaseAnnouncementWriter, err := getTemplateWriter(ri, releaseAnnouncementTemplateInput)
if err != nil {
return []NewDocInput{}, fmt.Errorf("getting template writer for release announcement: %w", err)
}
newDocInput = append(newDocInput, NewDocInput{
FileName: values.ReleaseAnnouncementFileName,
TemplateWriter: releaseAnnouncementWriter,
AppendToEnd: nil,
})
}
return newDocInput, nil
}
var getComponentsFromReleaseManifestFunc = func(ri releaseInfo) func() (string, error) {
manifestURL := ri.ManifestURL()
return func() (string, error) {
return values.GetComponentsFromReleaseManifest(manifestURL)
}
}
var getPrInfoForChangelogFunc = func(ri releaseInfo) func() (string, error) {
releaseVersion := "v" + ri.KubernetesMinorVersion()
return func() (string, error) {
riNum, err := strconv.Atoi(ri.Number())
if err != nil {
return "", fmt.Errorf("converting release number %v: %w", ri.Number(), err)
}
return values.GetChangelogPRs(releaseVersion, riNum)
}
}
| 80 |
eks-distro | aws | Go | package newdocs
import (
"bytes"
"path/filepath"
"text/template"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
// RELEASE ANNOUNCEMENT
var releaseAnnouncementTemplateInput = templateInput{
templateName: "releaseAnnouncementTemplate",
funcMap: template.FuncMap{},
docTemplate: `Amazon EKS Distro {{.Tag}} is now available. Builds are available through ECR Public Gallery (https://gallery.ecr.aws/eks-distro). The changelog and release manifest are available on GitHub (https://github.com/aws/eks-distro/releases).
`,
}
// CHANGELOG
var changelogTemplateInput = templateInput{
templateName: "changelogTemplate",
funcMap: template.FuncMap{},
docTemplate: `# Changelog for {{.Tag}}
This changelog highlights the changes for [{{.Tag}}](https://github.com/aws/eks-distro/tree/{{.Tag}}).
## Changes
`,
}
// INDEX
var indexTemplateInput = templateInput{
templateName: "indexTemplate",
funcMap: template.FuncMap{
"changelogFileNameFunc": func(ri releaseInfo) string {
return values.GetChangelogFileName(ri)
},
"filepathBaseFunc": func(manifestURL string) string {
return filepath.Base(manifestURL)
},
},
docTemplate: `# EKS-D {{.Tag}} Release
For additional information, see the [changelog]({{changelogFileNameFunc .}}) for this release.
## Release Manifest
Download the release manifest here: [{{filepathBaseFunc .ManifestURL}}]({{.ManifestURL}})
`,
}
type templateInput struct {
docTemplate string
templateName string
funcMap template.FuncMap
}
var getTemplateWriter = func(ri releaseInfo, input templateInput) (bytes.Buffer, error) {
t := template.Must(template.New(input.templateName).Funcs(input.funcMap).Parse(input.docTemplate))
out := bytes.Buffer{}
err := t.Execute(&out, ri)
return out, err
}
| 66 |
eks-distro | aws | Go | package main
import (
"flag"
"fmt"
"io"
"log"
"os"
"os/exec"
"path/filepath"
"strconv"
"github.com/aws/eks-distro/cmd/release/utils/changetype"
"github.com/aws/eks-distro/cmd/release/utils/release"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
var (
outputStream io.Writer = os.Stdout
errStream io.Writer = os.Stderr
ghReleaseScriptPath = filepath.Join(values.GetGitRootDirectory(), "cmd/release/gh-release/create.sh")
)
// Generates a release on GitHub. IMPORTANT! Only run after the prod release is out, you've pulled down the latest
// changes, and the git tag for the release is on GitHub.
func main() {
branch := flag.String("branch", "", "Release branch, e.g. 1-22")
overrideNumber := flag.Int("overrideNumber", release.InvalidNumberUpperLimit, "Optional override number, e.g. 1")
flag.Parse()
var err error
var r = &release.Release{}
if *overrideNumber <= release.InvalidNumberUpperLimit {
r, err = release.NewRelease(*branch, changetype.GHRelease)
if err != nil {
log.Fatalf("creating release values: %v", err)
}
} else {
r, err = release.NewReleaseOverrideNumber(*branch, strconv.Itoa(*overrideNumber))
if err != nil {
log.Fatalf("creating release values with override number: %v", err)
}
}
if err = createGitHubRelease(r); err != nil {
log.Fatalf("creating GitHub release: %v", err)
}
}
func createGitHubRelease(r *release.Release) error {
docsDirectory := values.GetReleaseDocsDirectory(r).String()
cmd := exec.Command(
"/bin/bash",
ghReleaseScriptPath,
r.Tag(),
filepath.Join(docsDirectory, values.GetChangelogFileName(r)),
filepath.Join(docsDirectory, "index.md"),
)
cmd.Stdout = outputStream
cmd.Stderr = errStream
if err := cmd.Run(); err != nil {
return fmt.Errorf("creating release from script: %w", err)
}
log.Printf("Published release!\nYou can view at it https://github.com/aws/eks-distro/releases/tag/%s\n", r.Tag())
return nil
}
| 72 |
eks-distro | aws | Go | package main
import (
"fmt"
"log"
"os"
"path/filepath"
"github.com/aws/eks-distro/cmd/release/minor/projects"
"github.com/aws/eks-distro/cmd/release/utils/changetype"
"github.com/aws/eks-distro/cmd/release/utils/values"
)
func main() {
latestSupportedReleaseBranch, err := values.GetLatestSupportedReleaseBranch()
if err != nil {
log.Fatalf("getting the latest supported release branch to create new minor release: %v", err)
}
// Adds new release branch to SUPPORTED_RELEASE_BRANCHES
addedReleaseBranch, err := values.AddNextReleaseBranch()
if err != nil {
log.Fatalf("getting the new release branch: %v", err)
}
log.Printf("Added %s to SUPPORTED_RELEASE_BRANCHES", addedReleaseBranch)
prevReleaseBranch, nextReleaseBranch := string(latestSupportedReleaseBranch), string(addedReleaseBranch)
// Adds project files new release branch
projectFilesAddedCount, err := projects.CreateFilesAndDirectories(prevReleaseBranch, nextReleaseBranch)
if err != nil {
log.Fatalf("creating project files and directories: %v", err)
}
log.Printf("Generated %d project files", projectFilesAddedCount)
// Adds release directory and sets RELEASE values to "0"
err = createReleaseDirectoryAndFiles(nextReleaseBranch)
if err != nil {
log.Fatalf("creating RELEASE files: %v", err)
}
log.Printf("Generated RELEASE files")
}
func createReleaseDirectoryAndFiles(nextReleaseBranch string) error {
newRBReleasePath := filepath.Join(values.GetGitRootDirectory(), "release", nextReleaseBranch)
if err := os.Mkdir(newRBReleasePath, 0755); err != nil {
return fmt.Errorf("creating new directory for release: %w", err)
}
for _, ct := range []changetype.ChangeType{changetype.Dev, changetype.Prod} {
ctDirPath := filepath.Join(newRBReleasePath, ct.String())
if err := os.Mkdir(ctDirPath, 0755); err != nil {
return fmt.Errorf("creating new directory for %s release: %w", ct.String(), err)
}
if err := os.WriteFile(filepath.Join(ctDirPath, "RELEASE"), []byte("0\n"), 0744); err != nil {
return fmt.Errorf("writing to RELEASE file: %w", err)
}
}
return nil
}
| 61 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.