|
|
|
/*
|
|
|
|
Copyright The Helm Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package rules
|
|
|
|
|
|
|
|
import (
|
Add name validation rules for object kinds
Signed-off-by: Simon Croome <simon@croome.org>
Developer Certificate of Origin
Version 1.1
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
1 Letterman Drive
Suite D4700
San Francisco, CA, 94129
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Developer's Certificate of Origin 1.1
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the open source license
indicated in the file; or
(b) The contribution is based upon previous work that, to the best
of my knowledge, is covered under an appropriate open source
license and I have the right under that license to submit that
work with modifications, whether created in whole or in part
by me, under the same open source license (unless I am
permitted to submit under a different license), as indicated
in the file; or
(c) The contribution was provided directly to me by some other
person who certified (a), (b) or (c) and I have not modified
it.
(d) I understand and agree that this project and the contribution
are public and that a record of the contribution (including all
personal information I submit with it, including my sign-off) is
maintained indefinitely and may be redistributed consistent with
this project or the open source license(s) involved.
Signed-off-by: Simon Croome <simon.croome@storageos.com>
4 years ago
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"helm.sh/helm/v3/pkg/chart"
|
|
|
|
"helm.sh/helm/v3/pkg/chartutil"
|
|
|
|
"helm.sh/helm/v3/pkg/lint/support"
|
|
|
|
)
|
|
|
|
|
|
|
|
const templateTestBasedir = "./testdata/albatross"
|
|
|
|
|
|
|
|
func TestValidateAllowedExtension(t *testing.T) {
|
|
|
|
var failTest = []string{"/foo", "/test.toml"}
|
|
|
|
for _, test := range failTest {
|
|
|
|
err := validateAllowedExtension(test)
|
|
|
|
if err == nil || !strings.Contains(err.Error(), "Valid extensions are .yaml, .yml, .tpl, or .txt") {
|
|
|
|
t.Errorf("validateAllowedExtension('%s') to return \"Valid extensions are .yaml, .yml, .tpl, or .txt\", got no error", test)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var successTest = []string{"/foo.yaml", "foo.yaml", "foo.tpl", "/foo/bar/baz.yaml", "NOTES.txt"}
|
|
|
|
for _, test := range successTest {
|
|
|
|
err := validateAllowedExtension(test)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("validateAllowedExtension('%s') to return no error but got \"%s\"", test, err.Error())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var values = map[string]interface{}{"nameOverride": "", "httpPort": 80}
|
|
|
|
|
|
|
|
const namespace = "testNamespace"
|
|
|
|
const strict = false
|
|
|
|
|
|
|
|
func TestTemplateParsing(t *testing.T) {
|
|
|
|
linter := support.Linter{ChartDir: templateTestBasedir}
|
|
|
|
Templates(&linter, values, namespace, strict)
|
|
|
|
res := linter.Messages
|
|
|
|
|
|
|
|
if len(res) != 1 {
|
|
|
|
t.Fatalf("Expected one error, got %d, %v", len(res), res)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.Contains(res[0].Err.Error(), "deliberateSyntaxError") {
|
|
|
|
t.Errorf("Unexpected error: %s", res[0])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var wrongTemplatePath = filepath.Join(templateTestBasedir, "templates", "fail.yaml")
|
|
|
|
var ignoredTemplatePath = filepath.Join(templateTestBasedir, "fail.yaml.ignored")
|
|
|
|
|
|
|
|
// Test a template with all the existing features:
|
|
|
|
// namespaces, partial templates
|
|
|
|
func TestTemplateIntegrationHappyPath(t *testing.T) {
|
|
|
|
// Rename file so it gets ignored by the linter
|
|
|
|
os.Rename(wrongTemplatePath, ignoredTemplatePath)
|
|
|
|
defer os.Rename(ignoredTemplatePath, wrongTemplatePath)
|
|
|
|
|
|
|
|
linter := support.Linter{ChartDir: templateTestBasedir}
|
|
|
|
Templates(&linter, values, namespace, strict)
|
|
|
|
res := linter.Messages
|
|
|
|
|
|
|
|
if len(res) != 0 {
|
|
|
|
t.Fatalf("Expected no error, got %d, %v", len(res), res)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestV3Fail(t *testing.T) {
|
|
|
|
linter := support.Linter{ChartDir: "./testdata/v3-fail"}
|
|
|
|
Templates(&linter, values, namespace, strict)
|
|
|
|
res := linter.Messages
|
|
|
|
|
|
|
|
if len(res) != 3 {
|
|
|
|
t.Fatalf("Expected 3 errors, got %d, %v", len(res), res)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.Contains(res[0].Err.Error(), ".Release.Time has been removed in v3") {
|
|
|
|
t.Errorf("Unexpected error: %s", res[0].Err)
|
|
|
|
}
|
|
|
|
if !strings.Contains(res[1].Err.Error(), "manifest is a crd-install hook") {
|
|
|
|
t.Errorf("Unexpected error: %s", res[1].Err)
|
|
|
|
}
|
|
|
|
if !strings.Contains(res[2].Err.Error(), "manifest is a crd-install hook") {
|
|
|
|
t.Errorf("Unexpected error: %s", res[2].Err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMultiTemplateFail(t *testing.T) {
|
|
|
|
linter := support.Linter{ChartDir: "./testdata/multi-template-fail"}
|
|
|
|
Templates(&linter, values, namespace, strict)
|
|
|
|
res := linter.Messages
|
|
|
|
|
|
|
|
if len(res) != 1 {
|
|
|
|
t.Fatalf("Expected 1 error, got %d, %v", len(res), res)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !strings.Contains(res[0].Err.Error(), "object name does not conform to Kubernetes naming requirements") {
|
|
|
|
t.Errorf("Unexpected error: %s", res[0].Err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateMetadataName(t *testing.T) {
|
Add name validation rules for object kinds
Signed-off-by: Simon Croome <simon@croome.org>
Developer Certificate of Origin
Version 1.1
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
1 Letterman Drive
Suite D4700
San Francisco, CA, 94129
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Developer's Certificate of Origin 1.1
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the open source license
indicated in the file; or
(b) The contribution is based upon previous work that, to the best
of my knowledge, is covered under an appropriate open source
license and I have the right under that license to submit that
work with modifications, whether created in whole or in part
by me, under the same open source license (unless I am
permitted to submit under a different license), as indicated
in the file; or
(c) The contribution was provided directly to me by some other
person who certified (a), (b) or (c) and I have not modified
it.
(d) I understand and agree that this project and the contribution
are public and that a record of the contribution (including all
personal information I submit with it, including my sign-off) is
maintained indefinitely and may be redistributed consistent with
this project or the open source license(s) involved.
Signed-off-by: Simon Croome <simon.croome@storageos.com>
4 years ago
|
|
|
tests := []struct {
|
|
|
|
obj *K8sYamlStruct
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
// Most kinds use IsDNS1123Subdomain.
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: ""}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "foo.bar1234baz.seventyone"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "FOO"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "123baz"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "foo.BAR.baz"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "one-two"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "-two"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "one_two"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "a..b"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "%^&#$%*@^*@&#^"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Pod", Metadata: k8sYamlMetadata{Name: "operator:pod"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "ServiceAccount", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ServiceAccount", Metadata: k8sYamlMetadata{Name: "foo.bar1234baz.seventyone"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ServiceAccount", Metadata: k8sYamlMetadata{Name: "FOO"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "ServiceAccount", Metadata: k8sYamlMetadata{Name: "operator:sa"}}, true},
|
|
|
|
|
|
|
|
// Service uses IsDNS1035Label.
|
|
|
|
{&K8sYamlStruct{Kind: "Service", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Service", Metadata: k8sYamlMetadata{Name: "123baz"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Service", Metadata: k8sYamlMetadata{Name: "foo.bar"}}, true},
|
|
|
|
|
|
|
|
// Namespace uses IsDNS1123Label.
|
|
|
|
{&K8sYamlStruct{Kind: "Namespace", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Namespace", Metadata: k8sYamlMetadata{Name: "123baz"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Namespace", Metadata: k8sYamlMetadata{Name: "foo.bar"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Namespace", Metadata: k8sYamlMetadata{Name: "foo-bar"}}, false},
|
|
|
|
|
|
|
|
// CertificateSigningRequest has no validation.
|
|
|
|
{&K8sYamlStruct{Kind: "CertificateSigningRequest", Metadata: k8sYamlMetadata{Name: ""}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "CertificateSigningRequest", Metadata: k8sYamlMetadata{Name: "123baz"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "CertificateSigningRequest", Metadata: k8sYamlMetadata{Name: "%^&#$%*@^*@&#^"}}, false},
|
|
|
|
|
|
|
|
// RBAC uses path validation.
|
|
|
|
{&K8sYamlStruct{Kind: "Role", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Role", Metadata: k8sYamlMetadata{Name: "123baz"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Role", Metadata: k8sYamlMetadata{Name: "foo.bar"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Role", Metadata: k8sYamlMetadata{Name: "operator:role"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "Role", Metadata: k8sYamlMetadata{Name: "operator/role"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "Role", Metadata: k8sYamlMetadata{Name: "operator%role"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRole", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRole", Metadata: k8sYamlMetadata{Name: "123baz"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRole", Metadata: k8sYamlMetadata{Name: "foo.bar"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRole", Metadata: k8sYamlMetadata{Name: "operator:role"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRole", Metadata: k8sYamlMetadata{Name: "operator/role"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRole", Metadata: k8sYamlMetadata{Name: "operator%role"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "RoleBinding", Metadata: k8sYamlMetadata{Name: "operator:role"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "ClusterRoleBinding", Metadata: k8sYamlMetadata{Name: "operator:role"}}, false},
|
|
|
|
|
|
|
|
// Unknown Kind
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: ""}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "foo.bar1234baz.seventyone"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "FOO"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "123baz"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "foo.BAR.baz"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "one-two"}}, false},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "-two"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "one_two"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "a..b"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "%^&#$%*@^*@&#^"}}, true},
|
|
|
|
{&K8sYamlStruct{Kind: "FutureKind", Metadata: k8sYamlMetadata{Name: "operator:pod"}}, true},
|
|
|
|
|
|
|
|
// No kind
|
|
|
|
{&K8sYamlStruct{Metadata: k8sYamlMetadata{Name: "foo"}}, false},
|
|
|
|
{&K8sYamlStruct{Metadata: k8sYamlMetadata{Name: "operator:pod"}}, true},
|
|
|
|
}
|
Add name validation rules for object kinds
Signed-off-by: Simon Croome <simon@croome.org>
Developer Certificate of Origin
Version 1.1
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
1 Letterman Drive
Suite D4700
San Francisco, CA, 94129
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Developer's Certificate of Origin 1.1
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the open source license
indicated in the file; or
(b) The contribution is based upon previous work that, to the best
of my knowledge, is covered under an appropriate open source
license and I have the right under that license to submit that
work with modifications, whether created in whole or in part
by me, under the same open source license (unless I am
permitted to submit under a different license), as indicated
in the file; or
(c) The contribution was provided directly to me by some other
person who certified (a), (b) or (c) and I have not modified
it.
(d) I understand and agree that this project and the contribution
are public and that a record of the contribution (including all
personal information I submit with it, including my sign-off) is
maintained indefinitely and may be redistributed consistent with
this project or the open source license(s) involved.
Signed-off-by: Simon Croome <simon.croome@storageos.com>
4 years ago
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(fmt.Sprintf("%s/%s", tt.obj.Kind, tt.obj.Metadata.Name), func(t *testing.T) {
|
|
|
|
if err := validateMetadataName(tt.obj); (err != nil) != tt.wantErr {
|
|
|
|
t.Errorf("validateMetadataName() error = %v, wantErr %v", err, tt.wantErr)
|
|
|
|
}
|
Add name validation rules for object kinds
Signed-off-by: Simon Croome <simon@croome.org>
Developer Certificate of Origin
Version 1.1
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
1 Letterman Drive
Suite D4700
San Francisco, CA, 94129
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Developer's Certificate of Origin 1.1
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the open source license
indicated in the file; or
(b) The contribution is based upon previous work that, to the best
of my knowledge, is covered under an appropriate open source
license and I have the right under that license to submit that
work with modifications, whether created in whole or in part
by me, under the same open source license (unless I am
permitted to submit under a different license), as indicated
in the file; or
(c) The contribution was provided directly to me by some other
person who certified (a), (b) or (c) and I have not modified
it.
(d) I understand and agree that this project and the contribution
are public and that a record of the contribution (including all
personal information I submit with it, including my sign-off) is
maintained indefinitely and may be redistributed consistent with
this project or the open source license(s) involved.
Signed-off-by: Simon Croome <simon.croome@storageos.com>
4 years ago
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDeprecatedAPIFails(t *testing.T) {
|
|
|
|
mychart := chart.Chart{
|
|
|
|
Metadata: &chart.Metadata{
|
|
|
|
APIVersion: "v2",
|
|
|
|
Name: "failapi",
|
|
|
|
Version: "0.1.0",
|
|
|
|
Icon: "satisfy-the-linting-gods.gif",
|
|
|
|
},
|
|
|
|
Templates: []*chart.File{
|
|
|
|
{
|
|
|
|
Name: "templates/baddeployment.yaml",
|
|
|
|
Data: []byte("apiVersion: apps/v1beta1\nkind: Deployment\nmetadata:\n name: baddep\nspec: {selector: {matchLabels: {foo: bar}}}"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "templates/goodsecret.yaml",
|
|
|
|
Data: []byte("apiVersion: v1\nkind: Secret\nmetadata:\n name: goodsecret"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
tmpdir := t.TempDir()
|
|
|
|
|
|
|
|
if err := chartutil.SaveDir(&mychart, tmpdir); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
linter := support.Linter{ChartDir: filepath.Join(tmpdir, mychart.Name())}
|
|
|
|
Templates(&linter, values, namespace, strict)
|
|
|
|
if l := len(linter.Messages); l != 1 {
|
|
|
|
for i, msg := range linter.Messages {
|
|
|
|
t.Logf("Message %d: %s", i, msg)
|
|
|
|
}
|
|
|
|
t.Fatalf("Expected 1 lint error, got %d", l)
|
|
|
|
}
|
|
|
|
|
|
|
|
err := linter.Messages[0].Err.(deprecatedAPIError)
|
|
|
|
if err.Deprecated != "apps/v1beta1 Deployment" {
|
|
|
|
t.Errorf("Surprised to learn that %q is deprecated", err.Deprecated)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const manifest = `apiVersion: v1
|
|
|
|
kind: ConfigMap
|
|
|
|
metadata:
|
|
|
|
name: foo
|
|
|
|
data:
|
|
|
|
myval1: {{default "val" .Values.mymap.key1 }}
|
|
|
|
myval2: {{default "val" .Values.mymap.key2 }}
|
|
|
|
`
|
|
|
|
|
|
|
|
// TestStrictTemplateParsingMapError is a regression test.
|
|
|
|
//
|
|
|
|
// The template engine should not produce an error when a map in values.yaml does
|
|
|
|
// not contain all possible keys.
|
|
|
|
//
|
|
|
|
// See https://github.com/helm/helm/issues/7483
|
|
|
|
func TestStrictTemplateParsingMapError(t *testing.T) {
|
|
|
|
|
|
|
|
ch := chart.Chart{
|
|
|
|
Metadata: &chart.Metadata{
|
|
|
|
Name: "regression7483",
|
|
|
|
APIVersion: "v2",
|
|
|
|
Version: "0.1.0",
|
|
|
|
},
|
|
|
|
Values: map[string]interface{}{
|
|
|
|
"mymap": map[string]string{
|
|
|
|
"key1": "val1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Templates: []*chart.File{
|
|
|
|
{
|
|
|
|
Name: "templates/configmap.yaml",
|
|
|
|
Data: []byte(manifest),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
dir := t.TempDir()
|
|
|
|
if err := chartutil.SaveDir(&ch, dir); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
linter := &support.Linter{
|
|
|
|
ChartDir: filepath.Join(dir, ch.Metadata.Name),
|
|
|
|
}
|
|
|
|
Templates(linter, ch.Values, namespace, strict)
|
|
|
|
if len(linter.Messages) != 0 {
|
|
|
|
t.Errorf("expected zero messages, got %d", len(linter.Messages))
|
|
|
|
for i, msg := range linter.Messages {
|
|
|
|
t.Logf("Message %d: %q", i, msg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateMatchSelector(t *testing.T) {
|
|
|
|
md := &K8sYamlStruct{
|
|
|
|
APIVersion: "apps/v1",
|
|
|
|
Kind: "Deployment",
|
|
|
|
Metadata: k8sYamlMetadata{
|
|
|
|
Name: "mydeployment",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
manifest := `
|
|
|
|
apiVersion: apps/v1
|
|
|
|
kind: Deployment
|
|
|
|
metadata:
|
|
|
|
name: nginx-deployment
|
|
|
|
labels:
|
|
|
|
app: nginx
|
|
|
|
spec:
|
|
|
|
replicas: 3
|
|
|
|
selector:
|
|
|
|
matchLabels:
|
|
|
|
app: nginx
|
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
app: nginx
|
|
|
|
spec:
|
|
|
|
containers:
|
|
|
|
- name: nginx
|
|
|
|
image: nginx:1.14.2
|
|
|
|
`
|
|
|
|
if err := validateMatchSelector(md, manifest); err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
manifest = `
|
|
|
|
apiVersion: apps/v1
|
|
|
|
kind: Deployment
|
|
|
|
metadata:
|
|
|
|
name: nginx-deployment
|
|
|
|
labels:
|
|
|
|
app: nginx
|
|
|
|
spec:
|
|
|
|
replicas: 3
|
|
|
|
selector:
|
|
|
|
matchExpressions:
|
|
|
|
app: nginx
|
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
app: nginx
|
|
|
|
spec:
|
|
|
|
containers:
|
|
|
|
- name: nginx
|
|
|
|
image: nginx:1.14.2
|
|
|
|
`
|
|
|
|
if err := validateMatchSelector(md, manifest); err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
manifest = `
|
|
|
|
apiVersion: apps/v1
|
|
|
|
kind: Deployment
|
|
|
|
metadata:
|
|
|
|
name: nginx-deployment
|
|
|
|
labels:
|
|
|
|
app: nginx
|
|
|
|
spec:
|
|
|
|
replicas: 3
|
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
app: nginx
|
|
|
|
spec:
|
|
|
|
containers:
|
|
|
|
- name: nginx
|
|
|
|
image: nginx:1.14.2
|
|
|
|
`
|
|
|
|
if err := validateMatchSelector(md, manifest); err == nil {
|
|
|
|
t.Error("expected Deployment with no selector to fail")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestValidateTopIndentLevel(t *testing.T) {
|
|
|
|
for doc, shouldFail := range map[string]bool{
|
|
|
|
// Should not fail
|
|
|
|
"\n\n\n\t\n \t\n": false,
|
|
|
|
"apiVersion:foo\n bar:baz": false,
|
|
|
|
"\n\n\napiVersion:foo\n\n\n": false,
|
|
|
|
// Should fail
|
|
|
|
" apiVersion:foo": true,
|
|
|
|
"\n\n apiVersion:foo\n\n": true,
|
|
|
|
} {
|
|
|
|
if err := validateTopIndentLevel(doc); (err == nil) == shouldFail {
|
|
|
|
t.Errorf("Expected %t for %q", shouldFail, doc)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestEmptyWithCommentsManifests checks the lint is not failing against empty manifests that contains only comments
|
|
|
|
// See https://github.com/helm/helm/issues/8621
|
|
|
|
func TestEmptyWithCommentsManifests(t *testing.T) {
|
|
|
|
mychart := chart.Chart{
|
|
|
|
Metadata: &chart.Metadata{
|
|
|
|
APIVersion: "v2",
|
|
|
|
Name: "emptymanifests",
|
|
|
|
Version: "0.1.0",
|
|
|
|
Icon: "satisfy-the-linting-gods.gif",
|
|
|
|
},
|
|
|
|
Templates: []*chart.File{
|
|
|
|
{
|
|
|
|
Name: "templates/empty-with-comments.yaml",
|
|
|
|
Data: []byte("#@formatter:off\n"),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
tmpdir := t.TempDir()
|
|
|
|
|
|
|
|
if err := chartutil.SaveDir(&mychart, tmpdir); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
linter := support.Linter{ChartDir: filepath.Join(tmpdir, mychart.Name())}
|
|
|
|
Templates(&linter, values, namespace, strict)
|
|
|
|
if l := len(linter.Messages); l > 0 {
|
|
|
|
for i, msg := range linter.Messages {
|
|
|
|
t.Logf("Message %d: %s", i, msg)
|
|
|
|
}
|
|
|
|
t.Fatalf("Expected 0 lint errors, got %d", l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
func TestValidateListAnnotations(t *testing.T) {
|
|
|
|
md := &K8sYamlStruct{
|
|
|
|
APIVersion: "v1",
|
|
|
|
Kind: "List",
|
|
|
|
Metadata: k8sYamlMetadata{
|
|
|
|
Name: "list",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
manifest := `
|
|
|
|
apiVersion: v1
|
|
|
|
kind: List
|
|
|
|
items:
|
|
|
|
- apiVersion: v1
|
|
|
|
kind: ConfigMap
|
|
|
|
metadata:
|
|
|
|
annotations:
|
|
|
|
helm.sh/resource-policy: keep
|
|
|
|
`
|
|
|
|
|
|
|
|
if err := validateListAnnotations(md, manifest); err == nil {
|
|
|
|
t.Fatal("expected list with nested keep annotations to fail")
|
|
|
|
}
|
|
|
|
|
|
|
|
manifest = `
|
|
|
|
apiVersion: v1
|
|
|
|
kind: List
|
|
|
|
metadata:
|
|
|
|
annotations:
|
|
|
|
helm.sh/resource-policy: keep
|
|
|
|
items:
|
|
|
|
- apiVersion: v1
|
|
|
|
kind: ConfigMap
|
|
|
|
`
|
|
|
|
|
|
|
|
if err := validateListAnnotations(md, manifest); err != nil {
|
|
|
|
t.Fatalf("List objects keep annotations should pass. got: %s", err)
|
|
|
|
}
|
|
|
|
}
|