@@ -25,11 +25,12 @@ import (
25
25
"testing"
26
26
"time"
27
27
28
- "github.com/aws/aws-sdk-go/aws"
28
+ "github.com/aws/aws-sdk-go-v2/aws"
29
+ "github.com/aws/aws-sdk-go-v2/service/eks"
30
+ ekstypes "github.com/aws/aws-sdk-go-v2/service/eks/types"
29
31
"github.com/aws/aws-sdk-go/aws/awserr"
30
32
stsrequest "github.com/aws/aws-sdk-go/aws/request"
31
33
"github.com/aws/aws-sdk-go/service/ec2"
32
- "github.com/aws/aws-sdk-go/service/eks"
33
34
"github.com/aws/aws-sdk-go/service/iam"
34
35
"github.com/aws/aws-sdk-go/service/sts"
35
36
"github.com/golang/mock/gomock"
@@ -129,7 +130,7 @@ func TestAWSManagedControlPlaneReconcilerIntegrationTests(t *testing.T) {
129
130
mockedCreateSGCalls (ec2Mock .EXPECT ())
130
131
mockedDescribeInstanceCall (ec2Mock .EXPECT ())
131
132
mockedEKSControlPlaneIAMRole (g , iamMock .EXPECT ())
132
- mockedEKSCluster (g , eksMock .EXPECT (), iamMock .EXPECT (), ec2Mock .EXPECT (), stsMock .EXPECT (), awsNodeMock .EXPECT (), kubeProxyMock .EXPECT (), iamAuthenticatorMock .EXPECT ())
133
+ mockedEKSCluster (ctx , g , eksMock .EXPECT (), iamMock .EXPECT (), ec2Mock .EXPECT (), stsMock .EXPECT (), awsNodeMock .EXPECT (), kubeProxyMock .EXPECT (), iamAuthenticatorMock .EXPECT ())
133
134
134
135
g .Expect (testEnv .Create (ctx , & cluster )).To (Succeed ())
135
136
cluster .Status .InfrastructureReady = true
@@ -828,10 +829,12 @@ func mockedEKSControlPlaneIAMRole(g *WithT, iamRec *mock_iamauth.MockIAMAPIMockR
828
829
}).After (getPolicyCall ).Return (& iam.AttachRolePolicyOutput {}, nil )
829
830
}
830
831
831
- func mockedEKSCluster (g * WithT , eksRec * mock_eksiface.MockEKSAPIMockRecorder , iamRec * mock_iamauth.MockIAMAPIMockRecorder , ec2Rec * mocks.MockEC2APIMockRecorder , stsRec * mock_stsiface.MockSTSAPIMockRecorder , awsNodeRec * mock_services.MockAWSNodeInterfaceMockRecorder , kubeProxyRec * mock_services.MockKubeProxyInterfaceMockRecorder , iamAuthenticatorRec * mock_services.MockIAMAuthenticatorInterfaceMockRecorder ) {
832
- describeClusterCall := eksRec .DescribeCluster (& eks.DescribeClusterInput {
832
+ func mockedEKSCluster (ctx context. Context , g * WithT , eksRec * mock_eksiface.MockEKSAPIMockRecorder , iamRec * mock_iamauth.MockIAMAPIMockRecorder , ec2Rec * mocks.MockEC2APIMockRecorder , stsRec * mock_stsiface.MockSTSAPIMockRecorder , awsNodeRec * mock_services.MockAWSNodeInterfaceMockRecorder , kubeProxyRec * mock_services.MockKubeProxyInterfaceMockRecorder , iamAuthenticatorRec * mock_services.MockIAMAuthenticatorInterfaceMockRecorder ) {
833
+ describeClusterCall := eksRec .DescribeCluster (ctx , & eks.DescribeClusterInput {
833
834
Name : aws .String ("test-cluster" ),
834
- }).Return (nil , awserr .New (eks .ErrCodeResourceNotFoundException , "" , nil ))
835
+ }).Return (nil , & ekstypes.ResourceNotFoundException {
836
+ Message : aws .String ("cluster not found" ),
837
+ })
835
838
836
839
getRoleCall := iamRec .GetRole (& iam.GetRoleInput {
837
840
RoleName : aws .String ("test-cluster-iam-service-role" ),
@@ -842,55 +845,55 @@ func mockedEKSCluster(g *WithT, eksRec *mock_eksiface.MockEKSAPIMockRecorder, ia
842
845
},
843
846
}, nil )
844
847
845
- resourcesVpcConfig := & eks .VpcConfigResponse {
848
+ resourcesVpcConfig := & ekstypes .VpcConfigResponse {
846
849
ClusterSecurityGroupId : aws .String ("eks-cluster-sg-test-cluster-44556677" ),
847
850
}
848
851
849
852
clusterARN := aws .String ("arn:aws:eks:us-east-1:1133557799:cluster/test-cluster" )
850
- clusterCreating := eks .Cluster {
853
+ clusterCreating := ekstypes .Cluster {
851
854
Arn : clusterARN ,
852
855
Name : aws .String ("test-cluster" ),
853
- Status : aws . String ( eks . ClusterStatusCreating ) ,
856
+ Status : ekstypes . ClusterStatusCreating ,
854
857
ResourcesVpcConfig : resourcesVpcConfig ,
855
- CertificateAuthority : & eks .Certificate {
858
+ CertificateAuthority : & ekstypes .Certificate {
856
859
Data : aws .String (base64 .StdEncoding .EncodeToString ([]byte ("foobar" ))),
857
860
},
858
- Logging : & eks .Logging {
859
- ClusterLogging : []* eks .LogSetup {
861
+ Logging : & ekstypes .Logging {
862
+ ClusterLogging : []ekstypes .LogSetup {
860
863
{
861
864
Enabled : aws .Bool (true ),
862
- Types : []* string { aws . String ( eks . LogTypeApi ) },
865
+ Types : []ekstypes. LogType { ekstypes . LogTypeApi },
863
866
},
864
867
{
865
868
Enabled : aws .Bool (false ),
866
- Types : []* string {
867
- aws . String ( eks . LogTypeAudit ) ,
868
- aws . String ( eks . LogTypeAuthenticator ) ,
869
- aws . String ( eks . LogTypeControllerManager ) ,
870
- aws . String ( eks . LogTypeScheduler ) ,
869
+ Types : []ekstypes. LogType {
870
+ ekstypes . LogTypeAudit ,
871
+ ekstypes . LogTypeAuthenticator ,
872
+ ekstypes . LogTypeControllerManager ,
873
+ ekstypes . LogTypeScheduler ,
871
874
},
872
875
},
873
876
},
874
877
},
875
878
}
876
879
877
- createClusterCall := eksRec .CreateCluster (gomock .Any ()).After (getRoleCall ).DoAndReturn (func (input * eks.CreateClusterInput ) (* eks.CreateClusterOutput , error ) {
880
+ createClusterCall := eksRec .CreateCluster (ctx , gomock .Any ()).After (getRoleCall ).DoAndReturn (func (ctx context. Context , input * eks.CreateClusterInput , optFns ... func ( * eks. Options ) ) (* eks.CreateClusterOutput , error ) {
878
881
g .Expect (input .Name ).To (BeComparableTo (aws .String ("test-cluster" )))
879
882
return & eks.CreateClusterOutput {
880
883
Cluster : & clusterCreating ,
881
884
}, nil
882
885
})
883
886
884
- waitUntilClusterActiveCall := eksRec .WaitUntilClusterActive (& eks.DescribeClusterInput {
887
+ waitUntilClusterActiveCall := eksRec .WaitUntilClusterActive (ctx , & eks.DescribeClusterInput {
885
888
Name : aws .String ("test-cluster" ),
886
889
}).After (createClusterCall ).Return (nil )
887
890
888
891
clusterActive := clusterCreating // copy
889
- clusterActive .Status = aws . String ( eks . ClusterStatusActive )
892
+ clusterActive .Status = ekstypes . ClusterStatusActive
890
893
clusterActive .Endpoint = aws .String ("https://F00D133712341337.gr7.us-east-1.eks.amazonaws.com" )
891
894
clusterActive .Version = aws .String ("1.24" )
892
895
893
- eksRec .DescribeCluster (& eks.DescribeClusterInput {
896
+ eksRec .DescribeCluster (ctx , & eks.DescribeClusterInput {
894
897
Name : aws .String ("test-cluster" ),
895
898
}).After (waitUntilClusterActiveCall ).Return (& eks.DescribeClusterOutput {
896
899
Cluster : & clusterActive ,
@@ -927,19 +930,21 @@ func mockedEKSCluster(g *WithT, eksRec *mock_eksiface.MockEKSAPIMockRecorder, ia
927
930
Operation : & stsrequest.Operation {},
928
931
}, & sts.GetCallerIdentityOutput {})
929
932
930
- eksRec .TagResource (& eks.TagResourceInput {
933
+ eksRec .TagResource (ctx , & eks.TagResourceInput {
931
934
ResourceArn : clusterARN ,
932
- Tags : aws . StringMap ( map [string ]string {
935
+ Tags : map [string ]string {
933
936
"Name" : "test-cluster" ,
934
937
"sigs.k8s.io/cluster-api-provider-aws/cluster/test-cluster" : "owned" ,
935
938
"sigs.k8s.io/cluster-api-provider-aws/role" : "common" ,
936
- }) ,
939
+ },
937
940
}).Return (& eks.TagResourceOutput {}, nil )
938
941
939
- eksRec .ListAddons (& eks.ListAddonsInput {
942
+ eksRec .ListAddons (ctx , & eks.ListAddonsInput {
940
943
ClusterName : aws .String ("test-cluster" ),
941
944
}).Return (& eks.ListAddonsOutput {}, nil )
942
945
946
+ eksRec .UpdateClusterConfig (ctx , gomock .AssignableToTypeOf (& eks.UpdateClusterConfigInput {})).After (waitUntilClusterActiveCall ).Return (& eks.UpdateClusterConfigOutput {}, nil )
947
+
943
948
awsNodeRec .ReconcileCNI (gomock .Any ()).Return (nil )
944
949
kubeProxyRec .ReconcileKubeProxy (gomock .Any ()).Return (nil )
945
950
iamAuthenticatorRec .ReconcileIAMAuthenticator (gomock .Any ()).Return (nil )
0 commit comments