Expose volumeMounts and volumes in gha-runner-scale-set-controller (#3260)
This commit is contained in:
		
							parent
							
								
									a68aa00bd8
								
							
						
					
					
						commit
						9fba37540a
					
				|  | @ -110,10 +110,16 @@ spec: | ||||||
|         volumeMounts: |         volumeMounts: | ||||||
|         - mountPath: /tmp |         - mountPath: /tmp | ||||||
|           name: tmp |           name: tmp | ||||||
|  |         {{- range .Values.volumeMounts }} | ||||||
|  |         - {{ toYaml . | nindent 10 }} | ||||||
|  |         {{- end }} | ||||||
|       terminationGracePeriodSeconds: 10 |       terminationGracePeriodSeconds: 10 | ||||||
|       volumes: |       volumes: | ||||||
|       - name: tmp |       - name: tmp | ||||||
|         emptyDir: {} |         emptyDir: {} | ||||||
|  |       {{- range .Values.volumes }} | ||||||
|  |       - {{ toYaml . | nindent 8 }} | ||||||
|  |       {{- end }} | ||||||
|       {{- with .Values.nodeSelector }} |       {{- with .Values.nodeSelector }} | ||||||
|       nodeSelector: |       nodeSelector: | ||||||
|         {{- toYaml . | nindent 8 }} |         {{- toYaml . | nindent 8 }} | ||||||
|  |  | ||||||
|  | @ -428,6 +428,10 @@ func TestTemplate_ControllerDeployment_Customize(t *testing.T) { | ||||||
| 			"flags.updateStrategy":      "eventual", | 			"flags.updateStrategy":      "eventual", | ||||||
| 			"flags.logLevel":            "info", | 			"flags.logLevel":            "info", | ||||||
| 			"flags.logFormat":           "json", | 			"flags.logFormat":           "json", | ||||||
|  | 			"volumes[0].name":           "customMount", | ||||||
|  | 			"volumes[0].configMap.name": "my-configmap", | ||||||
|  | 			"volumeMounts[0].name":      "customMount", | ||||||
|  | 			"volumeMounts[0].mountPath": "/my/mount/path", | ||||||
| 		}, | 		}, | ||||||
| 		KubectlOptions: k8s.NewKubectlOptions("", "", namespaceName), | 		KubectlOptions: k8s.NewKubectlOptions("", "", namespaceName), | ||||||
| 	} | 	} | ||||||
|  | @ -470,9 +474,11 @@ func TestTemplate_ControllerDeployment_Customize(t *testing.T) { | ||||||
| 	assert.Equal(t, int64(1000), *deployment.Spec.Template.Spec.SecurityContext.FSGroup) | 	assert.Equal(t, int64(1000), *deployment.Spec.Template.Spec.SecurityContext.FSGroup) | ||||||
| 	assert.Equal(t, "test-priority-class", deployment.Spec.Template.Spec.PriorityClassName) | 	assert.Equal(t, "test-priority-class", deployment.Spec.Template.Spec.PriorityClassName) | ||||||
| 	assert.Equal(t, int64(10), *deployment.Spec.Template.Spec.TerminationGracePeriodSeconds) | 	assert.Equal(t, int64(10), *deployment.Spec.Template.Spec.TerminationGracePeriodSeconds) | ||||||
| 	assert.Len(t, deployment.Spec.Template.Spec.Volumes, 1) | 	assert.Len(t, deployment.Spec.Template.Spec.Volumes, 2) | ||||||
| 	assert.Equal(t, "tmp", deployment.Spec.Template.Spec.Volumes[0].Name) | 	assert.Equal(t, "tmp", deployment.Spec.Template.Spec.Volumes[0].Name) | ||||||
| 	assert.NotNil(t, 10, deployment.Spec.Template.Spec.Volumes[0].EmptyDir) | 	assert.NotNil(t, deployment.Spec.Template.Spec.Volumes[0].EmptyDir) | ||||||
|  | 	assert.Equal(t, "customMount", deployment.Spec.Template.Spec.Volumes[1].Name) | ||||||
|  | 	assert.Equal(t, "my-configmap", deployment.Spec.Template.Spec.Volumes[1].ConfigMap.Name) | ||||||
| 
 | 
 | ||||||
| 	assert.Len(t, deployment.Spec.Template.Spec.NodeSelector, 1) | 	assert.Len(t, deployment.Spec.Template.Spec.NodeSelector, 1) | ||||||
| 	assert.Equal(t, "bar", deployment.Spec.Template.Spec.NodeSelector["foo"]) | 	assert.Equal(t, "bar", deployment.Spec.Template.Spec.NodeSelector["foo"]) | ||||||
|  | @ -521,9 +527,11 @@ func TestTemplate_ControllerDeployment_Customize(t *testing.T) { | ||||||
| 	assert.True(t, *deployment.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot) | 	assert.True(t, *deployment.Spec.Template.Spec.Containers[0].SecurityContext.RunAsNonRoot) | ||||||
| 	assert.Equal(t, int64(1000), *deployment.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser) | 	assert.Equal(t, int64(1000), *deployment.Spec.Template.Spec.Containers[0].SecurityContext.RunAsUser) | ||||||
| 
 | 
 | ||||||
| 	assert.Len(t, deployment.Spec.Template.Spec.Containers[0].VolumeMounts, 1) | 	assert.Len(t, deployment.Spec.Template.Spec.Containers[0].VolumeMounts, 2) | ||||||
| 	assert.Equal(t, "tmp", deployment.Spec.Template.Spec.Containers[0].VolumeMounts[0].Name) | 	assert.Equal(t, "tmp", deployment.Spec.Template.Spec.Containers[0].VolumeMounts[0].Name) | ||||||
| 	assert.Equal(t, "/tmp", deployment.Spec.Template.Spec.Containers[0].VolumeMounts[0].MountPath) | 	assert.Equal(t, "/tmp", deployment.Spec.Template.Spec.Containers[0].VolumeMounts[0].MountPath) | ||||||
|  | 	assert.Equal(t, "customMount", deployment.Spec.Template.Spec.Containers[0].VolumeMounts[1].Name) | ||||||
|  | 	assert.Equal(t, "/my/mount/path", deployment.Spec.Template.Spec.Containers[0].VolumeMounts[1].MountPath) | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func TestTemplate_EnableLeaderElectionRole(t *testing.T) { | func TestTemplate_EnableLeaderElectionRole(t *testing.T) { | ||||||
|  |  | ||||||
|  | @ -72,6 +72,10 @@ tolerations: [] | ||||||
| 
 | 
 | ||||||
| affinity: {} | affinity: {} | ||||||
| 
 | 
 | ||||||
|  | # Mount volumes in the container. | ||||||
|  | volumes: [] | ||||||
|  | volumeMounts: [] | ||||||
|  | 
 | ||||||
| # Leverage a PriorityClass to ensure your pods survive resource shortages | # Leverage a PriorityClass to ensure your pods survive resource shortages | ||||||
| # ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ | # ref: https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ | ||||||
| # PriorityClass: system-cluster-critical | # PriorityClass: system-cluster-critical | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue