@@ -66,6 +66,29 @@ func (m *MockedFakeEC2) expectDescribeSecurityGroups(clusterID, groupName string
66
66
}}).Return ([]* ec2.SecurityGroup {{Tags : tags }})
67
67
}
68
68
69
+ func (m * MockedFakeEC2 ) expectDescribeSecurityGroupsAll (clusterID string ) {
70
+ tags := []* ec2.Tag {
71
+ {Key : aws .String (TagNameKubernetesClusterLegacy ), Value : aws .String (clusterID )},
72
+ {Key : aws .String (fmt .Sprintf ("%s%s" , TagNameKubernetesClusterPrefix , clusterID )), Value : aws .String (ResourceLifecycleOwned )},
73
+ }
74
+
75
+ m .On ("DescribeSecurityGroups" , & ec2.DescribeSecurityGroupsInput {}).Return ([]* ec2.SecurityGroup {{
76
+ GroupId : aws .String ("sg-123456" ),
77
+ Tags : tags ,
78
+ }})
79
+ }
80
+
81
+ func (m * MockedFakeEC2 ) expectDescribeSecurityGroupsByFilter (clusterID , filterName string , filterValues ... string ) {
82
+ tags := []* ec2.Tag {
83
+ {Key : aws .String (TagNameKubernetesClusterLegacy ), Value : aws .String (clusterID )},
84
+ {Key : aws .String (fmt .Sprintf ("%s%s" , TagNameKubernetesClusterPrefix , clusterID )), Value : aws .String (ResourceLifecycleOwned )},
85
+ }
86
+
87
+ m .On ("DescribeSecurityGroups" , & ec2.DescribeSecurityGroupsInput {Filters : []* ec2.Filter {
88
+ newEc2Filter (filterName , filterValues ... ),
89
+ }}).Return ([]* ec2.SecurityGroup {{Tags : tags }})
90
+ }
91
+
69
92
func (m * MockedFakeEC2 ) DescribeVolumes (request * ec2.DescribeVolumesInput ) ([]* ec2.Volume , error ) {
70
93
args := m .Called (request )
71
94
return args .Get (0 ).([]* ec2.Volume ), nil
@@ -117,7 +140,11 @@ func (m *MockedFakeELB) DescribeLoadBalancers(input *elb.DescribeLoadBalancersIn
117
140
118
141
func (m * MockedFakeELB ) expectDescribeLoadBalancers (loadBalancerName string ) {
119
142
m .On ("DescribeLoadBalancers" , & elb.DescribeLoadBalancersInput {LoadBalancerNames : []* string {aws .String (loadBalancerName )}}).Return (& elb.DescribeLoadBalancersOutput {
120
- LoadBalancerDescriptions : []* elb.LoadBalancerDescription {{}},
143
+ LoadBalancerDescriptions : []* elb.LoadBalancerDescription {
144
+ {
145
+ SecurityGroups : []* string {aws .String ("sg-123456" )},
146
+ },
147
+ },
121
148
})
122
149
}
123
150
@@ -1790,6 +1817,9 @@ func TestDescribeLoadBalancerOnDelete(t *testing.T) {
1790
1817
awsServices := newMockedFakeAWSServices (TestClusterID )
1791
1818
c , _ := newAWSCloud (CloudConfig {}, awsServices )
1792
1819
awsServices .elb .(* MockedFakeELB ).expectDescribeLoadBalancers ("aid" )
1820
+ awsServices .ec2 .(* MockedFakeEC2 ).expectDescribeSecurityGroupsByFilter (TestClusterID , "group-id" , "sg-123456" )
1821
+ awsServices .ec2 .(* MockedFakeEC2 ).expectDescribeSecurityGroupsAll (TestClusterID )
1822
+ awsServices .ec2 .(* MockedFakeEC2 ).expectDescribeSecurityGroupsByFilter (TestClusterID , "ip-permission.group-id" , "sg-123456" )
1793
1823
1794
1824
c .EnsureLoadBalancerDeleted (context .TODO (), TestClusterName , & v1.Service {ObjectMeta : metav1.ObjectMeta {Name : "myservice" , UID : "id" }})
1795
1825
}
@@ -1798,6 +1828,8 @@ func TestDescribeLoadBalancerOnUpdate(t *testing.T) {
1798
1828
awsServices := newMockedFakeAWSServices (TestClusterID )
1799
1829
c , _ := newAWSCloud (CloudConfig {}, awsServices )
1800
1830
awsServices .elb .(* MockedFakeELB ).expectDescribeLoadBalancers ("aid" )
1831
+ awsServices .ec2 .(* MockedFakeEC2 ).expectDescribeSecurityGroupsAll (TestClusterID )
1832
+ awsServices .ec2 .(* MockedFakeEC2 ).expectDescribeSecurityGroupsByFilter (TestClusterID , "ip-permission.group-id" , "sg-123456" )
1801
1833
1802
1834
c .UpdateLoadBalancer (context .TODO (), TestClusterName , & v1.Service {ObjectMeta : metav1.ObjectMeta {Name : "myservice" , UID : "id" }}, []* v1.Node {})
1803
1835
}
@@ -3344,8 +3376,9 @@ func TestAzToRegion(t *testing.T) {
3344
3376
3345
3377
func TestCloud_sortELBSecurityGroupList (t * testing.T ) {
3346
3378
type args struct {
3347
- securityGroupIDs []string
3348
- annotations map [string ]string
3379
+ securityGroupIDs []string
3380
+ annotations map [string ]string
3381
+ taggedLBSecurityGroups map [string ]struct {}
3349
3382
}
3350
3383
tests := []struct {
3351
3384
name string
@@ -3391,11 +3424,21 @@ func TestCloud_sortELBSecurityGroupList(t *testing.T) {
3391
3424
},
3392
3425
wantSecurityGroupIDs : []string {"sg-3" , "sg-2" , "sg-1" , "sg-4" , "sg-6" , "sg-5" },
3393
3426
},
3427
+ {
3428
+ name : "with an untagged, and unknown security group" ,
3429
+ args : args {
3430
+ securityGroupIDs : []string {"sg-2" , "sg-1" },
3431
+ taggedLBSecurityGroups : map [string ]struct {}{
3432
+ "sg-1" : {},
3433
+ },
3434
+ },
3435
+ wantSecurityGroupIDs : []string {"sg-1" , "sg-2" },
3436
+ },
3394
3437
}
3395
3438
for _ , tt := range tests {
3396
3439
t .Run (tt .name , func (t * testing.T ) {
3397
3440
c := & Cloud {}
3398
- c .sortELBSecurityGroupList (tt .args .securityGroupIDs , tt .args .annotations )
3441
+ c .sortELBSecurityGroupList (tt .args .securityGroupIDs , tt .args .annotations , tt . args . taggedLBSecurityGroups )
3399
3442
assert .Equal (t , tt .wantSecurityGroupIDs , tt .args .securityGroupIDs )
3400
3443
})
3401
3444
}
0 commit comments