garm/runner/templates_test.go
Gabriel 23f92bc335
Add runner install template management (#525)
* Add template api endpoints

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Added template bypass

Pools and scale sets will automatically migrate to the new template
system for runner install scripts. If a pool or a scale set cannot be
migrate, it is left alone. It is expected that users set a runner install
template manually for scenarios we don't yet have a template for (windows
on gitea for example).

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Integrate templates with pool create/update

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Add webapp integration with templates

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Add unit tests

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Populate all relevant context fields

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Update dependencies

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Fix lint

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Validate uint

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Add CLI template management

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Some editor improvements and bugfixes

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Fix scale set return values post create

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

* Fix template websocket events filter

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>

---------

Signed-off-by: Gabriel Adrian Samfira <gsamfira@cloudbasesolutions.com>
2025-09-23 13:46:27 +03:00

326 lines
10 KiB
Go

// Copyright 2025 Cloudbase Solutions SRL
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may
// not use this file except in compliance with the License. You may obtain
// a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
// License for the specific language governing permissions and limitations
// under the License.
package runner
import (
"context"
"fmt"
"testing"
"github.com/stretchr/testify/suite"
runnerErrors "github.com/cloudbase/garm-provider-common/errors"
commonParams "github.com/cloudbase/garm-provider-common/params"
"github.com/cloudbase/garm/database"
dbCommon "github.com/cloudbase/garm/database/common"
garmTesting "github.com/cloudbase/garm/internal/testing"
"github.com/cloudbase/garm/params"
"github.com/cloudbase/garm/runner/common"
runnerCommonMocks "github.com/cloudbase/garm/runner/common/mocks"
runnerMocks "github.com/cloudbase/garm/runner/mocks"
)
const (
testTemplate1Name = "test-template-1"
)
type TemplateTestFixtures struct {
AdminContext context.Context
Store dbCommon.Store
Templates []params.Template
Providers map[string]common.Provider
ProviderMock *runnerCommonMocks.Provider
PoolMgrCtrlMock *runnerMocks.PoolManagerController
CreateTemplateParams params.CreateTemplateParams
UpdateTemplateParams params.UpdateTemplateParams
}
type TemplateTestSuite struct {
suite.Suite
Fixtures *TemplateTestFixtures
Runner *Runner
adminCtx context.Context
nonAdminCtx context.Context
githubEndpoint params.ForgeEndpoint
}
func (s *TemplateTestSuite) SetupTest() {
// create testing sqlite database
dbCfg := garmTesting.GetTestSqliteDBConfig(s.T())
db, err := database.NewDatabase(context.Background(), dbCfg)
if err != nil {
s.FailNow(fmt.Sprintf("failed to create db connection: %s", err))
}
s.adminCtx = garmTesting.ImpersonateAdminContext(context.Background(), db, s.T())
s.nonAdminCtx = context.Background() // Non-admin context for unauthorized tests
s.githubEndpoint = garmTesting.CreateDefaultGithubEndpoint(s.adminCtx, db, s.T())
// Create test templates
template1, err := db.CreateTemplate(s.adminCtx, params.CreateTemplateParams{
Name: testTemplate1Name,
Description: "Test template 1",
OSType: commonParams.Linux,
ForgeType: params.GithubEndpointType,
Data: []byte(`{"provider": "lxd", "image": "ubuntu:22.04"}`),
})
if err != nil {
s.FailNow(fmt.Sprintf("failed to create test template 1: %s", err))
}
template2, err := db.CreateTemplate(s.adminCtx, params.CreateTemplateParams{
Name: "test-template-2",
Description: "Test template 2",
OSType: commonParams.Windows,
ForgeType: params.GithubEndpointType,
Data: []byte(`{"provider": "azure", "image": "windows-2022"}`),
})
if err != nil {
s.FailNow(fmt.Sprintf("failed to create test template 2: %s", err))
}
templates := []params.Template{template1, template2}
providerMock := runnerCommonMocks.NewProvider(s.T())
fixtures := &TemplateTestFixtures{
AdminContext: s.adminCtx,
Store: db,
Templates: templates,
Providers: map[string]common.Provider{
"test-provider": providerMock,
},
ProviderMock: providerMock,
PoolMgrCtrlMock: runnerMocks.NewPoolManagerController(s.T()),
CreateTemplateParams: params.CreateTemplateParams{
Name: "new-template",
Description: "New test template",
OSType: commonParams.Linux,
ForgeType: params.GithubEndpointType,
Data: []byte(`{"provider": "lxd", "image": "ubuntu:20.04"}`),
},
UpdateTemplateParams: params.UpdateTemplateParams{
Name: garmTesting.Ptr("updated-template-name"),
Description: garmTesting.Ptr("Updated description"),
Data: []byte(`{"provider": "updated", "image": "updated:latest"}`),
},
}
s.Fixtures = fixtures
// setup test runner
runner := &Runner{
providers: fixtures.Providers,
ctx: fixtures.AdminContext,
store: fixtures.Store,
poolManagerCtrl: fixtures.PoolMgrCtrlMock,
}
s.Runner = runner
}
func (s *TemplateTestSuite) TestCreateTemplate() {
template, err := s.Runner.CreateTemplate(s.adminCtx, s.Fixtures.CreateTemplateParams)
s.Require().Nil(err)
s.Require().Equal(s.Fixtures.CreateTemplateParams.Name, template.Name)
s.Require().Equal(s.Fixtures.CreateTemplateParams.Description, template.Description)
s.Require().Equal(s.Fixtures.CreateTemplateParams.OSType, template.OSType)
s.Require().Equal(s.Fixtures.CreateTemplateParams.ForgeType, template.ForgeType)
}
func (s *TemplateTestSuite) TestCreateTemplateUnauthorized() {
_, err := s.Runner.CreateTemplate(s.nonAdminCtx, s.Fixtures.CreateTemplateParams)
s.Require().NotNil(err)
s.Require().ErrorIs(err, runnerErrors.ErrUnauthorized)
}
func (s *TemplateTestSuite) TestCreateTemplateInvalidParams() {
invalidParams := params.CreateTemplateParams{
Name: "", // Empty name should fail validation
Description: "Invalid template",
OSType: commonParams.Linux,
ForgeType: params.GithubEndpointType,
Data: []byte(`{"provider": "lxd"}`),
}
_, err := s.Runner.CreateTemplate(s.adminCtx, invalidParams)
s.Require().NotNil(err)
s.Require().Contains(err.Error(), "invalid create params")
}
func (s *TemplateTestSuite) TestGetTemplate() {
template, err := s.Runner.GetTemplate(s.adminCtx, s.Fixtures.Templates[0].ID)
s.Require().Nil(err)
s.Require().Equal(s.Fixtures.Templates[0].ID, template.ID)
s.Require().Equal(s.Fixtures.Templates[0].Name, template.Name)
s.Require().Equal(s.Fixtures.Templates[0].Description, template.Description)
}
func (s *TemplateTestSuite) TestGetTemplateUnauthorized() {
_, err := s.Runner.GetTemplate(s.nonAdminCtx, s.Fixtures.Templates[0].ID)
s.Require().NotNil(err)
s.Require().ErrorIs(err, runnerErrors.ErrUnauthorized)
}
func (s *TemplateTestSuite) TestGetTemplateNotFound() {
_, err := s.Runner.GetTemplate(s.adminCtx, 9999)
s.Require().NotNil(err)
s.Require().Contains(err.Error(), "failed to get template")
}
func (s *TemplateTestSuite) TestListTemplates() {
templates, err := s.Runner.ListTemplates(s.adminCtx, nil, nil, nil)
s.Require().Nil(err)
s.Require().GreaterOrEqual(len(templates), len(s.Fixtures.Templates))
// Find our test templates in the results
foundNames := make(map[string]bool)
for _, template := range templates {
foundNames[template.Name] = true
}
for _, expected := range s.Fixtures.Templates {
s.Require().True(foundNames[expected.Name], "Expected template %s not found", expected.Name)
}
}
func (s *TemplateTestSuite) TestListTemplatesUnauthorized() {
_, err := s.Runner.ListTemplates(s.nonAdminCtx, nil, nil, nil)
s.Require().NotNil(err)
s.Require().ErrorIs(err, runnerErrors.ErrUnauthorized)
}
func (s *TemplateTestSuite) TestListTemplatesWithOSTypeFilter() {
osType := commonParams.Linux
templates, err := s.Runner.ListTemplates(s.adminCtx, &osType, nil, nil)
s.Require().Nil(err)
s.Require().GreaterOrEqual(len(templates), 1)
// Verify all returned templates have the correct OS type
for _, template := range templates {
s.Require().Equal(commonParams.Linux, template.OSType)
}
// Find our test template
found := false
for _, template := range templates {
if template.Name == testTemplate1Name {
found = true
break
}
}
s.Require().True(found, "Expected %s not found", testTemplate1Name)
}
func (s *TemplateTestSuite) TestListTemplatesWithForgeTypeFilter() {
forgeType := params.GithubEndpointType
templates, err := s.Runner.ListTemplates(s.adminCtx, nil, &forgeType, nil)
s.Require().Nil(err)
s.Require().GreaterOrEqual(len(templates), 2)
// Verify all returned templates have the correct forge type
for _, template := range templates {
s.Require().Equal(params.GithubEndpointType, template.ForgeType)
}
}
func (s *TemplateTestSuite) TestListTemplatesWithNameFilter() {
partialName := testTemplate1Name
templates, err := s.Runner.ListTemplates(s.adminCtx, nil, nil, &partialName)
s.Require().Nil(err)
s.Require().GreaterOrEqual(len(templates), 1)
found := false
for _, template := range templates {
if template.Name == testTemplate1Name {
found = true
break
}
}
s.Require().True(found, "Expected %s not found", testTemplate1Name)
}
func (s *TemplateTestSuite) TestUpdateTemplate() {
template, err := s.Runner.UpdateTemplate(s.adminCtx, s.Fixtures.Templates[0].ID, s.Fixtures.UpdateTemplateParams)
s.Require().Nil(err)
s.Require().Equal(*s.Fixtures.UpdateTemplateParams.Name, template.Name)
s.Require().Equal(*s.Fixtures.UpdateTemplateParams.Description, template.Description)
}
func (s *TemplateTestSuite) TestUpdateTemplateUnauthorized() {
_, err := s.Runner.UpdateTemplate(s.nonAdminCtx, s.Fixtures.Templates[0].ID, s.Fixtures.UpdateTemplateParams)
s.Require().NotNil(err)
s.Require().ErrorIs(err, runnerErrors.ErrUnauthorized)
}
func (s *TemplateTestSuite) TestUpdateTemplateInvalidParams() {
invalidParams := params.UpdateTemplateParams{
Name: garmTesting.Ptr(""), // Empty name should fail validation
}
_, err := s.Runner.UpdateTemplate(s.adminCtx, s.Fixtures.Templates[0].ID, invalidParams)
s.Require().NotNil(err)
s.Require().Contains(err.Error(), "invalid update params")
}
func (s *TemplateTestSuite) TestUpdateTemplateNotFound() {
_, err := s.Runner.UpdateTemplate(s.adminCtx, 9999, s.Fixtures.UpdateTemplateParams)
s.Require().NotNil(err)
s.Require().Contains(err.Error(), "failed to update template")
}
func (s *TemplateTestSuite) TestDeleteTemplate() {
err := s.Runner.DeleteTemplate(s.adminCtx, s.Fixtures.Templates[1].ID)
s.Require().Nil(err)
// Verify template is deleted by trying to get it
_, err = s.Runner.GetTemplate(s.adminCtx, s.Fixtures.Templates[1].ID)
s.Require().NotNil(err)
s.Require().Contains(err.Error(), "failed to get template")
}
func (s *TemplateTestSuite) TestDeleteTemplateUnauthorized() {
err := s.Runner.DeleteTemplate(s.nonAdminCtx, s.Fixtures.Templates[0].ID)
s.Require().NotNil(err)
s.Require().ErrorIs(err, runnerErrors.ErrUnauthorized)
}
func (s *TemplateTestSuite) TestDeleteTemplateNotFound() {
// The DeleteTemplate function silently handles ErrNotFound, so this should not error
err := s.Runner.DeleteTemplate(s.adminCtx, 9999)
s.Require().Nil(err) // Should not error for not found templates
}
func TestTemplateTestSuite(t *testing.T) {
suite.Run(t, new(TemplateTestSuite))
}