@@ -135,7 +135,6 @@ func TestEnsureLUKSVolumePassphrase(t *testing.T) {
135135 "luks-passphrase" : "passphraseA" ,
136136 }
137137 mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseA" ).Return (true , nil )
138- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"A" }).Return (nil )
139138 err = ensureLUKSVolumePassphrase (context .TODO (), mockClient , mockLUKSDevice , "test-vol" , secrets , true )
140139 assert .NoError (t , err )
141140 mockCtrl .Finish ()
@@ -153,10 +152,7 @@ func TestEnsureLUKSVolumePassphrase(t *testing.T) {
153152 }
154153 mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (false , nil )
155154 mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseA" ).Return (true , nil )
156- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" , "A" }).Return (nil )
157155 mockLUKSDevice .EXPECT ().RotatePassphrase (gomock .Any (), "test-vol" , "passphraseA" , "passphraseB" ).Return (nil )
158- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (true , nil )
159- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" }).Return (nil )
160156 err = ensureLUKSVolumePassphrase (context .TODO (), mockClient , mockLUKSDevice , "test-vol" , secrets , false )
161157 assert .NoError (t , err )
162158 mockCtrl .Finish ()
@@ -196,24 +192,6 @@ func TestEnsureLUKSVolumePassphrase_Error(t *testing.T) {
196192 assert .Error (t , err )
197193 mockCtrl .Finish ()
198194
199- // ////////////////////////////////////////////////////////////////////////////////////////////////////////////
200- // Negative case: Sending pre-rotation passphrases to trident controller fails
201- mockCtrl = gomock .NewController (t )
202- mockClient = mockControllerAPI .NewMockTridentController (mockCtrl )
203- mockLUKSDevice = mock_luks .NewMockDevice (mockCtrl )
204- secrets = map [string ]string {
205- "luks-passphrase-name" : "B" ,
206- "luks-passphrase" : "passphraseB" ,
207- "previous-luks-passphrase-name" : "A" ,
208- "previous-luks-passphrase" : "passphraseA" ,
209- }
210- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (false , nil )
211- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseA" ).Return (true , nil )
212- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" , "A" }).Return (fmt .Errorf ("test error" ))
213- err = ensureLUKSVolumePassphrase (context .TODO (), mockClient , mockLUKSDevice , "test-vol" , secrets , false )
214- assert .Error (t , err )
215- mockCtrl .Finish ()
216-
217195 // ////////////////////////////////////////////////////////////////////////////////////////////////////////////
218196 // Negative case: Passphrase rotation fails
219197 mockCtrl = gomock .NewController (t )
@@ -227,52 +205,10 @@ func TestEnsureLUKSVolumePassphrase_Error(t *testing.T) {
227205 }
228206 mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (false , nil )
229207 mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseA" ).Return (true , nil )
230- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" , "A" }).Return (nil )
231208 mockLUKSDevice .EXPECT ().RotatePassphrase (gomock .Any (), "test-vol" , "passphraseA" , "passphraseB" ).Return (fmt .Errorf ("test error" ))
232209 err = ensureLUKSVolumePassphrase (context .TODO (), mockClient , mockLUKSDevice , "test-vol" , secrets , false )
233210 assert .Error (t , err )
234211 mockCtrl .Finish ()
235-
236- // ////////////////////////////////////////////////////////////////////////////////////////////////////////////
237- // Negative case: Verifying passphrase rotation fails
238- mockCtrl = gomock .NewController (t )
239- mockClient = mockControllerAPI .NewMockTridentController (mockCtrl )
240- mockLUKSDevice = mock_luks .NewMockDevice (mockCtrl )
241- secrets = map [string ]string {
242- "luks-passphrase-name" : "B" ,
243- "luks-passphrase" : "passphraseB" ,
244- "previous-luks-passphrase-name" : "A" ,
245- "previous-luks-passphrase" : "passphraseA" ,
246- }
247- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (false , nil )
248- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseA" ).Return (true , nil )
249- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" , "A" }).Return (nil )
250- mockLUKSDevice .EXPECT ().RotatePassphrase (gomock .Any (), "test-vol" , "passphraseA" , "passphraseB" ).Return (nil )
251- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (true , fmt .Errorf ("test error" ))
252- err = ensureLUKSVolumePassphrase (context .TODO (), mockClient , mockLUKSDevice , "test-vol" , secrets , false )
253- assert .Error (t , err )
254- mockCtrl .Finish ()
255-
256- // ////////////////////////////////////////////////////////////////////////////////////////////////////////////
257- // Negative case: Sending post-rotation passphrases to trident controller fails
258- mockCtrl = gomock .NewController (t )
259- mockClient = mockControllerAPI .NewMockTridentController (mockCtrl )
260- mockLUKSDevice = mock_luks .NewMockDevice (mockCtrl )
261- secrets = map [string ]string {
262- "luks-passphrase-name" : "B" ,
263- "luks-passphrase" : "passphraseB" ,
264- "previous-luks-passphrase-name" : "A" ,
265- "previous-luks-passphrase" : "passphraseA" ,
266- }
267- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (false , nil )
268- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseA" ).Return (true , nil )
269- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" , "A" }).Return (nil )
270- mockLUKSDevice .EXPECT ().RotatePassphrase (gomock .Any (), "test-vol" , "passphraseA" , "passphraseB" ).Return (nil )
271- mockLUKSDevice .EXPECT ().CheckPassphrase (gomock .Any (), "passphraseB" ).Return (true , nil )
272- mockClient .EXPECT ().UpdateVolumeLUKSPassphraseNames (gomock .Any (), "test-vol" , []string {"B" }).Return (fmt .Errorf ("test error" ))
273- err = ensureLUKSVolumePassphrase (context .TODO (), mockClient , mockLUKSDevice , "test-vol" , secrets , false )
274- assert .Error (t , err )
275- mockCtrl .Finish ()
276212}
277213
278214func TestEnsureLUKSVolumePassphrase_InvalidSecret (t * testing.T ) {
0 commit comments