|
|
@ -306,6 +306,7 @@ func Test_loadPersistedBootstrapConfig(t *testing.T) {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
type testCase struct {
|
|
|
|
type testCase struct {
|
|
|
|
existingCluster bool
|
|
|
|
existingCluster bool
|
|
|
|
|
|
|
|
disableManagementToken bool
|
|
|
|
mutateFn func(t *testing.T, dir string)
|
|
|
|
mutateFn func(t *testing.T, dir string)
|
|
|
|
expect expect
|
|
|
|
expect expect
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -319,7 +320,7 @@ func Test_loadPersistedBootstrapConfig(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
|
|
// Do some common setup as if we received config from HCP and persisted it to disk.
|
|
|
|
// Do some common setup as if we received config from HCP and persisted it to disk.
|
|
|
|
require.NoError(t, lib.EnsurePath(dir, true))
|
|
|
|
require.NoError(t, lib.EnsurePath(dir, true))
|
|
|
|
require.NoError(t, persistSucessMarker(dir))
|
|
|
|
require.NoError(t, persistSuccessMarker(dir))
|
|
|
|
|
|
|
|
|
|
|
|
if !tc.existingCluster {
|
|
|
|
if !tc.existingCluster {
|
|
|
|
caCert, caKey, err := tlsutil.GenerateCA(tlsutil.CAOpts{})
|
|
|
|
caCert, caKey, err := tlsutil.GenerateCA(tlsutil.CAOpts{})
|
|
|
@ -333,9 +334,12 @@ func Test_loadPersistedBootstrapConfig(t *testing.T) {
|
|
|
|
require.NoError(t, persistBootstrapConfig(dir, cfgJSON))
|
|
|
|
require.NoError(t, persistBootstrapConfig(dir, cfgJSON))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
token, err := uuid.GenerateUUID()
|
|
|
|
var token string
|
|
|
|
|
|
|
|
if !tc.disableManagementToken {
|
|
|
|
|
|
|
|
token, err = uuid.GenerateUUID()
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, persistManagementToken(dir, token))
|
|
|
|
require.NoError(t, persistManagementToken(dir, token))
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Optionally mutate the persisted data to trigger errors while loading.
|
|
|
|
// Optionally mutate the persisted data to trigger errors while loading.
|
|
|
|
if tc.mutateFn != nil {
|
|
|
|
if tc.mutateFn != nil {
|
|
|
@ -348,7 +352,6 @@ func Test_loadPersistedBootstrapConfig(t *testing.T) {
|
|
|
|
if loaded {
|
|
|
|
if loaded {
|
|
|
|
require.Equal(t, token, cfg.ManagementToken)
|
|
|
|
require.Equal(t, token, cfg.ManagementToken)
|
|
|
|
require.Empty(t, ui.ErrorWriter.String())
|
|
|
|
require.Empty(t, ui.ErrorWriter.String())
|
|
|
|
|
|
|
|
|
|
|
|
} else {
|
|
|
|
} else {
|
|
|
|
require.Nil(t, cfg)
|
|
|
|
require.Nil(t, cfg)
|
|
|
|
require.Contains(t, ui.ErrorWriter.String(), tc.expect.warning)
|
|
|
|
require.Contains(t, ui.ErrorWriter.String(), tc.expect.warning)
|
|
|
@ -365,15 +368,11 @@ func Test_loadPersistedBootstrapConfig(t *testing.T) {
|
|
|
|
warning: "",
|
|
|
|
warning: "",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"existing cluster missing token": {
|
|
|
|
"existing cluster no token": {
|
|
|
|
existingCluster: true,
|
|
|
|
existingCluster: true,
|
|
|
|
mutateFn: func(t *testing.T, dir string) {
|
|
|
|
disableManagementToken: true,
|
|
|
|
// Remove the token file while leaving the existing cluster marker.
|
|
|
|
|
|
|
|
require.NoError(t, os.Remove(filepath.Join(dir, tokenFileName)))
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
expect: expect{
|
|
|
|
expect: expect{
|
|
|
|
loaded: false,
|
|
|
|
loaded: false,
|
|
|
|
warning: "configuration files on disk are incomplete",
|
|
|
|
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"existing cluster no files": {
|
|
|
|
"existing cluster no files": {
|
|
|
@ -396,6 +395,12 @@ func Test_loadPersistedBootstrapConfig(t *testing.T) {
|
|
|
|
warning: "",
|
|
|
|
warning: "",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
"new cluster with no token": {
|
|
|
|
|
|
|
|
disableManagementToken: true,
|
|
|
|
|
|
|
|
expect: expect{
|
|
|
|
|
|
|
|
loaded: false,
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
},
|
|
|
|
"new cluster some files": {
|
|
|
|
"new cluster some files": {
|
|
|
|
mutateFn: func(t *testing.T, dir string) {
|
|
|
|
mutateFn: func(t *testing.T, dir string) {
|
|
|
|
// Remove one of the required files
|
|
|
|
// Remove one of the required files
|
|
|
|