mirror of https://github.com/helm/helm
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
240 lines
7.1 KiB
240 lines
7.1 KiB
/*
|
|
Copyright The Helm Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package driver // import "k8s.io/helm/pkg/storage/driver"
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
sqlmock "github.com/DATA-DOG/go-sqlmock"
|
|
"github.com/jmoiron/sqlx"
|
|
"k8s.io/api/core/v1"
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
corev1 "k8s.io/client-go/kubernetes/typed/core/v1"
|
|
|
|
rspb "k8s.io/helm/pkg/proto/hapi/release"
|
|
)
|
|
|
|
func releaseStub(name string, vers int32, namespace string, code rspb.Status_Code) *rspb.Release {
|
|
return &rspb.Release{
|
|
Name: name,
|
|
Version: vers,
|
|
Namespace: namespace,
|
|
Info: &rspb.Info{Status: &rspb.Status{Code: code}},
|
|
}
|
|
}
|
|
|
|
func testKey(name string, vers int32) string {
|
|
return fmt.Sprintf("%s.v%d", name, vers)
|
|
}
|
|
|
|
func tsFixtureMemory(t *testing.T) *Memory {
|
|
hs := []*rspb.Release{
|
|
// rls-a
|
|
releaseStub("rls-a", 4, "default", rspb.Status_DEPLOYED),
|
|
releaseStub("rls-a", 1, "default", rspb.Status_SUPERSEDED),
|
|
releaseStub("rls-a", 3, "default", rspb.Status_SUPERSEDED),
|
|
releaseStub("rls-a", 2, "default", rspb.Status_SUPERSEDED),
|
|
// rls-b
|
|
releaseStub("rls-b", 4, "default", rspb.Status_DEPLOYED),
|
|
releaseStub("rls-b", 1, "default", rspb.Status_SUPERSEDED),
|
|
releaseStub("rls-b", 3, "default", rspb.Status_SUPERSEDED),
|
|
releaseStub("rls-b", 2, "default", rspb.Status_SUPERSEDED),
|
|
}
|
|
|
|
mem := NewMemory()
|
|
for _, tt := range hs {
|
|
err := mem.Create(testKey(tt.Name, tt.Version), tt)
|
|
if err != nil {
|
|
t.Fatalf("Test setup failed to create: %s\n", err)
|
|
}
|
|
}
|
|
return mem
|
|
}
|
|
|
|
// newTestFixture initializes a MockConfigMapsInterface.
|
|
// ConfigMaps are created for each release provided.
|
|
func newTestFixtureCfgMaps(t *testing.T, releases ...*rspb.Release) *ConfigMaps {
|
|
var mock MockConfigMapsInterface
|
|
mock.Init(t, releases...)
|
|
|
|
return NewConfigMaps(&mock)
|
|
}
|
|
|
|
// MockConfigMapsInterface mocks a kubernetes ConfigMapsInterface
|
|
type MockConfigMapsInterface struct {
|
|
corev1.ConfigMapInterface
|
|
|
|
objects map[string]*v1.ConfigMap
|
|
}
|
|
|
|
// Init initializes the MockConfigMapsInterface with the set of releases.
|
|
func (mock *MockConfigMapsInterface) Init(t *testing.T, releases ...*rspb.Release) {
|
|
mock.objects = map[string]*v1.ConfigMap{}
|
|
|
|
for _, rls := range releases {
|
|
objkey := testKey(rls.Name, rls.Version)
|
|
|
|
cfgmap, err := newConfigMapsObject(objkey, rls, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create configmap: %s", err)
|
|
}
|
|
mock.objects[objkey] = cfgmap
|
|
}
|
|
}
|
|
|
|
// Get returns the ConfigMap by name.
|
|
func (mock *MockConfigMapsInterface) Get(name string, options metav1.GetOptions) (*v1.ConfigMap, error) {
|
|
object, ok := mock.objects[name]
|
|
if !ok {
|
|
return nil, apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name)
|
|
}
|
|
return object, nil
|
|
}
|
|
|
|
// List returns the a of ConfigMaps.
|
|
func (mock *MockConfigMapsInterface) List(opts metav1.ListOptions) (*v1.ConfigMapList, error) {
|
|
var list v1.ConfigMapList
|
|
for _, cfgmap := range mock.objects {
|
|
list.Items = append(list.Items, *cfgmap)
|
|
}
|
|
return &list, nil
|
|
}
|
|
|
|
// Create creates a new ConfigMap.
|
|
func (mock *MockConfigMapsInterface) Create(cfgmap *v1.ConfigMap) (*v1.ConfigMap, error) {
|
|
name := cfgmap.ObjectMeta.Name
|
|
if object, ok := mock.objects[name]; ok {
|
|
return object, apierrors.NewAlreadyExists(schema.GroupResource{Resource: "tests"}, name)
|
|
}
|
|
mock.objects[name] = cfgmap
|
|
return cfgmap, nil
|
|
}
|
|
|
|
// Update updates a ConfigMap.
|
|
func (mock *MockConfigMapsInterface) Update(cfgmap *v1.ConfigMap) (*v1.ConfigMap, error) {
|
|
name := cfgmap.ObjectMeta.Name
|
|
if _, ok := mock.objects[name]; !ok {
|
|
return nil, apierrors.NewNotFound(v1.Resource("tests"), name)
|
|
}
|
|
mock.objects[name] = cfgmap
|
|
return cfgmap, nil
|
|
}
|
|
|
|
// Delete deletes a ConfigMap by name.
|
|
func (mock *MockConfigMapsInterface) Delete(name string, opts *metav1.DeleteOptions) error {
|
|
if _, ok := mock.objects[name]; !ok {
|
|
return apierrors.NewNotFound(v1.Resource("tests"), name)
|
|
}
|
|
delete(mock.objects, name)
|
|
return nil
|
|
}
|
|
|
|
// newTestFixture initializes a MockSecretsInterface.
|
|
// Secrets are created for each release provided.
|
|
func newTestFixtureSecrets(t *testing.T, releases ...*rspb.Release) *Secrets {
|
|
var mock MockSecretsInterface
|
|
mock.Init(t, releases...)
|
|
|
|
return NewSecrets(&mock)
|
|
}
|
|
|
|
// MockSecretsInterface mocks a kubernetes SecretsInterface
|
|
type MockSecretsInterface struct {
|
|
corev1.SecretInterface
|
|
|
|
objects map[string]*v1.Secret
|
|
}
|
|
|
|
// Init initializes the MockSecretsInterface with the set of releases.
|
|
func (mock *MockSecretsInterface) Init(t *testing.T, releases ...*rspb.Release) {
|
|
mock.objects = map[string]*v1.Secret{}
|
|
|
|
for _, rls := range releases {
|
|
objkey := testKey(rls.Name, rls.Version)
|
|
|
|
secret, err := newSecretsObject(objkey, rls, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create secret: %s", err)
|
|
}
|
|
mock.objects[objkey] = secret
|
|
}
|
|
}
|
|
|
|
// Get returns the Secret by name.
|
|
func (mock *MockSecretsInterface) Get(name string, options metav1.GetOptions) (*v1.Secret, error) {
|
|
object, ok := mock.objects[name]
|
|
if !ok {
|
|
return nil, apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name)
|
|
}
|
|
return object, nil
|
|
}
|
|
|
|
// List returns the a of Secret.
|
|
func (mock *MockSecretsInterface) List(opts metav1.ListOptions) (*v1.SecretList, error) {
|
|
var list v1.SecretList
|
|
for _, secret := range mock.objects {
|
|
list.Items = append(list.Items, *secret)
|
|
}
|
|
return &list, nil
|
|
}
|
|
|
|
// Create creates a new Secret.
|
|
func (mock *MockSecretsInterface) Create(secret *v1.Secret) (*v1.Secret, error) {
|
|
name := secret.ObjectMeta.Name
|
|
if object, ok := mock.objects[name]; ok {
|
|
return object, apierrors.NewAlreadyExists(schema.GroupResource{Resource: "tests"}, name)
|
|
}
|
|
mock.objects[name] = secret
|
|
return secret, nil
|
|
}
|
|
|
|
// Update updates a Secret.
|
|
func (mock *MockSecretsInterface) Update(secret *v1.Secret) (*v1.Secret, error) {
|
|
name := secret.ObjectMeta.Name
|
|
if _, ok := mock.objects[name]; !ok {
|
|
return nil, apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name)
|
|
}
|
|
mock.objects[name] = secret
|
|
return secret, nil
|
|
}
|
|
|
|
// Delete deletes a Secret by name.
|
|
func (mock *MockSecretsInterface) Delete(name string, opts *metav1.DeleteOptions) error {
|
|
if _, ok := mock.objects[name]; !ok {
|
|
return apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name)
|
|
}
|
|
delete(mock.objects, name)
|
|
return nil
|
|
}
|
|
|
|
// newTestFixtureSQL mocks the SQL database (for testing purposes)
|
|
func newTestFixtureSQL(t *testing.T, releases ...*rspb.Release) (*SQL, sqlmock.Sqlmock) {
|
|
sqlDB, mock, err := sqlmock.New()
|
|
if err != nil {
|
|
t.Fatalf("error when opening stub database connection: %v", err)
|
|
}
|
|
|
|
sqlxDB := sqlx.NewDb(sqlDB, "sqlmock")
|
|
return &SQL{
|
|
db: sqlxDB,
|
|
Log: func(_ string, _ ...interface{}) {},
|
|
}, mock
|
|
}
|