mirror of https://github.com/helm/helm
Signed-off-by: shipengqi <pooky.shipengqi@gmail.com>pull/12277/head
parent
9c7b862c57
commit
b411b5e6a3
@ -0,0 +1,241 @@
|
||||
/*
|
||||
Copyright The Helm Authors.
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package driver
|
||||
|
||||
import (
|
||||
"encoding/base64"
|
||||
"encoding/json"
|
||||
"reflect"
|
||||
"testing"
|
||||
|
||||
v1 "k8s.io/api/core/v1"
|
||||
|
||||
rspb "helm.sh/helm/v3/pkg/release"
|
||||
)
|
||||
|
||||
func TestMultiSecretsName(t *testing.T) {
|
||||
c := newTestFixtureMultiSecrets(t)
|
||||
if c.Name() != MultiSecretsDriverName {
|
||||
t.Errorf("Expected name to be %q, got %q", MultiSecretsDriverName, c.Name())
|
||||
}
|
||||
}
|
||||
|
||||
func TestMultiSecretsGet(t *testing.T) {
|
||||
vers := 1
|
||||
name := "smug-pigeon"
|
||||
namespace := "default"
|
||||
key := testKey(name, vers)
|
||||
rel := releaseStub(name, vers, namespace, rspb.StatusDeployed)
|
||||
|
||||
secrets := newTestFixtureMultiSecrets(t, []*rspb.Release{rel}...)
|
||||
|
||||
// get release with key
|
||||
got, err := secrets.Get(key)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to get release: %s", err)
|
||||
}
|
||||
// compare fetched release with original
|
||||
if !reflect.DeepEqual(rel, got) {
|
||||
t.Errorf("Expected {%v}, got {%v}", rel, got)
|
||||
}
|
||||
}
|
||||
|
||||
func TestUNcompressedMultiSecretsGet(t *testing.T) {
|
||||
vers := 1
|
||||
name := "smug-pigeon"
|
||||
namespace := "default"
|
||||
key := testKey(name, vers)
|
||||
rel := releaseStub(name, vers, namespace, rspb.StatusDeployed)
|
||||
|
||||
// Create a test fixture which contains an uncompressed release
|
||||
secret, err := newSecretsObject(key, rel, nil)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to create secret: %s", err)
|
||||
}
|
||||
b, err := json.Marshal(rel)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to marshal release: %s", err)
|
||||
}
|
||||
secret.Data["release"] = []byte(base64.StdEncoding.EncodeToString(b))
|
||||
var mock MockSecretsInterface
|
||||
mock.objects = map[string]*v1.Secret{key: secret}
|
||||
secrets := NewSecrets(&mock)
|
||||
|
||||
// get release with key
|
||||
got, err := secrets.Get(key)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to get release: %s", err)
|
||||
}
|
||||
// compare fetched release with original
|
||||
if !reflect.DeepEqual(rel, got) {
|
||||
t.Errorf("Expected {%v}, got {%v}", rel, got)
|
||||
}
|
||||
}
|
||||
|
||||
func TestMultiSecretsList(t *testing.T) {
|
||||
secrets := newTestFixtureMultiSecrets(t, []*rspb.Release{
|
||||
releaseStub("key-1", 1, "default", rspb.StatusUninstalled),
|
||||
releaseStub("key-2", 1, "default", rspb.StatusUninstalled),
|
||||
releaseStub("key-3", 1, "default", rspb.StatusDeployed),
|
||||
releaseStub("key-4", 1, "default", rspb.StatusDeployed),
|
||||
releaseStub("key-5", 1, "default", rspb.StatusSuperseded),
|
||||
releaseStub("key-6", 1, "default", rspb.StatusSuperseded),
|
||||
}...)
|
||||
|
||||
// list all deleted releases
|
||||
del, err := secrets.List(func(rel *rspb.Release) bool {
|
||||
return rel.Info.Status == rspb.StatusUninstalled
|
||||
})
|
||||
// check
|
||||
if err != nil {
|
||||
t.Errorf("Failed to list deleted: %s", err)
|
||||
}
|
||||
if len(del) != 2 {
|
||||
t.Errorf("Expected 2 deleted, got %d:\n%v\n", len(del), del)
|
||||
}
|
||||
|
||||
// list all deployed releases
|
||||
dpl, err := secrets.List(func(rel *rspb.Release) bool {
|
||||
return rel.Info.Status == rspb.StatusDeployed
|
||||
})
|
||||
// check
|
||||
if err != nil {
|
||||
t.Errorf("Failed to list deployed: %s", err)
|
||||
}
|
||||
if len(dpl) != 2 {
|
||||
t.Errorf("Expected 2 deployed, got %d", len(dpl))
|
||||
}
|
||||
|
||||
// list all superseded releases
|
||||
ssd, err := secrets.List(func(rel *rspb.Release) bool {
|
||||
return rel.Info.Status == rspb.StatusSuperseded
|
||||
})
|
||||
// check
|
||||
if err != nil {
|
||||
t.Errorf("Failed to list superseded: %s", err)
|
||||
}
|
||||
if len(ssd) != 2 {
|
||||
t.Errorf("Expected 2 superseded, got %d", len(ssd))
|
||||
}
|
||||
}
|
||||
|
||||
func TestMultiSecretsQuery(t *testing.T) {
|
||||
secrets := newTestFixtureMultiSecrets(t, []*rspb.Release{
|
||||
releaseStub("key-1", 1, "default", rspb.StatusUninstalled),
|
||||
releaseStub("key-2", 1, "default", rspb.StatusUninstalled),
|
||||
releaseStub("key-3", 1, "default", rspb.StatusDeployed),
|
||||
releaseStub("key-4", 1, "default", rspb.StatusDeployed),
|
||||
releaseStub("key-5", 1, "default", rspb.StatusSuperseded),
|
||||
releaseStub("key-6", 1, "default", rspb.StatusSuperseded),
|
||||
}...)
|
||||
|
||||
rls, err := secrets.Query(map[string]string{"status": "deployed"})
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to query: %s", err)
|
||||
}
|
||||
if len(rls) != 2 {
|
||||
t.Fatalf("Expected 2 results, actual %d", len(rls))
|
||||
}
|
||||
|
||||
_, err = secrets.Query(map[string]string{"name": "notExist"})
|
||||
if err != ErrReleaseNotFound {
|
||||
t.Errorf("Expected {%v}, got {%v}", ErrReleaseNotFound, err)
|
||||
}
|
||||
}
|
||||
|
||||
func TestMultiSecretsCreate(t *testing.T) {
|
||||
secrets := newTestFixtureMultiSecrets(t)
|
||||
|
||||
vers := 1
|
||||
name := "smug-pigeon"
|
||||
namespace := "default"
|
||||
key := testKey(name, vers)
|
||||
rel := releaseStub(name, vers, namespace, rspb.StatusDeployed)
|
||||
|
||||
// store the release in a secret
|
||||
if err := secrets.Create(key, rel); err != nil {
|
||||
t.Fatalf("Failed to create release with key %q: %s", key, err)
|
||||
}
|
||||
|
||||
// get the release back
|
||||
got, err := secrets.Get(key)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to get release with key %q: %s", key, err)
|
||||
}
|
||||
|
||||
// compare created release with original
|
||||
if !reflect.DeepEqual(rel, got) {
|
||||
t.Errorf("Expected {%v}, got {%v}", rel, got)
|
||||
}
|
||||
}
|
||||
|
||||
func TestMultiSecretsUpdate(t *testing.T) {
|
||||
vers := 1
|
||||
name := "smug-pigeon"
|
||||
namespace := "default"
|
||||
key := testKey(name, vers)
|
||||
rel := releaseStub(name, vers, namespace, rspb.StatusDeployed)
|
||||
|
||||
secrets := newTestFixtureMultiSecrets(t, []*rspb.Release{rel}...)
|
||||
|
||||
// modify release status code
|
||||
rel.Info.Status = rspb.StatusSuperseded
|
||||
|
||||
// perform the update
|
||||
if err := secrets.Update(key, rel); err != nil {
|
||||
t.Fatalf("Failed to update release: %s", err)
|
||||
}
|
||||
|
||||
// fetch the updated release
|
||||
got, err := secrets.Get(key)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to get release with key %q: %s", key, err)
|
||||
}
|
||||
|
||||
// check release has actually been updated by comparing modified fields
|
||||
if rel.Info.Status != got.Info.Status {
|
||||
t.Errorf("Expected status %s, got status %s", rel.Info.Status.String(), got.Info.Status.String())
|
||||
}
|
||||
}
|
||||
|
||||
func TestMultiSecretsDelete(t *testing.T) {
|
||||
vers := 1
|
||||
name := "smug-pigeon"
|
||||
namespace := "default"
|
||||
key := testKey(name, vers)
|
||||
rel := releaseStub(name, vers, namespace, rspb.StatusDeployed)
|
||||
|
||||
secrets := newTestFixtureMultiSecrets(t, []*rspb.Release{rel}...)
|
||||
|
||||
// perform the delete on a non-existing release
|
||||
_, err := secrets.Delete("nonexistent")
|
||||
if err != ErrReleaseNotFound {
|
||||
t.Fatalf("Expected ErrReleaseNotFound, got: {%v}", err)
|
||||
}
|
||||
|
||||
// perform the delete
|
||||
rls, err := secrets.Delete(key)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to delete release with key %q: %s", key, err)
|
||||
}
|
||||
if !reflect.DeepEqual(rel, rls) {
|
||||
t.Errorf("Expected {%v}, got {%v}", rel, rls)
|
||||
}
|
||||
|
||||
// fetch the deleted release
|
||||
_, err = secrets.Get(key)
|
||||
if !reflect.DeepEqual(ErrReleaseNotFound, err) {
|
||||
t.Errorf("Expected {%v}, got {%v}", ErrReleaseNotFound, err)
|
||||
}
|
||||
}
|
Loading…
Reference in new issue