791 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			791 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
| package app
 | |
| 
 | |
| import (
 | |
| 	"bufio"
 | |
| 	"bytes"
 | |
| 	"io"
 | |
| 	"path/filepath"
 | |
| 	"sync"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/google/go-cmp/cmp"
 | |
| 	"github.com/roboll/helmfile/pkg/exectest"
 | |
| 	"github.com/roboll/helmfile/pkg/helmexec"
 | |
| 	"github.com/roboll/helmfile/pkg/testhelper"
 | |
| 	"github.com/variantdev/vals"
 | |
| )
 | |
| 
 | |
| func TestSync(t *testing.T) {
 | |
| 	type fields struct {
 | |
| 		skipNeeds    bool
 | |
| 		includeNeeds bool
 | |
| 	}
 | |
| 
 | |
| 	type testcase struct {
 | |
| 		fields            fields
 | |
| 		ns                string
 | |
| 		concurrency       int
 | |
| 		skipDiffOnInstall bool
 | |
| 		error             string
 | |
| 		files             map[string]string
 | |
| 		selectors         []string
 | |
| 		lists             map[exectest.ListKey]string
 | |
| 		upgraded          []exectest.Release
 | |
| 		deleted           []exectest.Release
 | |
| 		log               string
 | |
| 	}
 | |
| 
 | |
| 	check := func(t *testing.T, tc testcase) {
 | |
| 		t.Helper()
 | |
| 
 | |
| 		wantUpgrades := tc.upgraded
 | |
| 		wantDeletes := tc.deleted
 | |
| 
 | |
| 		var helm = &exectest.Helm{
 | |
| 			FailOnUnexpectedList: true,
 | |
| 			FailOnUnexpectedDiff: true,
 | |
| 			Lists:                tc.lists,
 | |
| 			DiffMutex:            &sync.Mutex{},
 | |
| 			ChartsMutex:          &sync.Mutex{},
 | |
| 			ReleasesMutex:        &sync.Mutex{},
 | |
| 		}
 | |
| 
 | |
| 		bs := &bytes.Buffer{}
 | |
| 
 | |
| 		func() {
 | |
| 			t.Helper()
 | |
| 
 | |
| 			logReader, logWriter := io.Pipe()
 | |
| 
 | |
| 			logFlushed := &sync.WaitGroup{}
 | |
| 			// Ensure all the log is consumed into `bs` by calling `logWriter.Close()` followed by `logFlushed.Wait()`
 | |
| 			logFlushed.Add(1)
 | |
| 			go func() {
 | |
| 				scanner := bufio.NewScanner(logReader)
 | |
| 				for scanner.Scan() {
 | |
| 					bs.Write(scanner.Bytes())
 | |
| 					bs.WriteString("\n")
 | |
| 				}
 | |
| 				logFlushed.Done()
 | |
| 			}()
 | |
| 
 | |
| 			defer func() {
 | |
| 				// This is here to avoid data-trace on bytes buffer `bs` to capture logs
 | |
| 				if err := logWriter.Close(); err != nil {
 | |
| 					panic(err)
 | |
| 				}
 | |
| 				logFlushed.Wait()
 | |
| 			}()
 | |
| 
 | |
| 			logger := helmexec.NewLogger(logWriter, "debug")
 | |
| 
 | |
| 			valsRuntime, err := vals.New(vals.Options{CacheSize: 32})
 | |
| 			if err != nil {
 | |
| 				t.Errorf("unexpected error creating vals runtime: %v", err)
 | |
| 			}
 | |
| 
 | |
| 			app := appWithFs(&App{
 | |
| 				OverrideHelmBinary:  DefaultHelmBinary,
 | |
| 				glob:                filepath.Glob,
 | |
| 				abs:                 filepath.Abs,
 | |
| 				OverrideKubeContext: "default",
 | |
| 				Env:                 "default",
 | |
| 				Logger:              logger,
 | |
| 				helms: map[helmKey]helmexec.Interface{
 | |
| 					createHelmKey("helm", "default"): helm,
 | |
| 				},
 | |
| 				valsRuntime: valsRuntime,
 | |
| 			}, tc.files)
 | |
| 
 | |
| 			if tc.ns != "" {
 | |
| 				app.Namespace = tc.ns
 | |
| 			}
 | |
| 
 | |
| 			if tc.selectors != nil {
 | |
| 				app.Selectors = tc.selectors
 | |
| 			}
 | |
| 
 | |
| 			syncErr := app.Sync(applyConfig{
 | |
| 				// if we check log output, concurrency must be 1. otherwise the test becomes non-deterministic.
 | |
| 				concurrency:       tc.concurrency,
 | |
| 				logger:            logger,
 | |
| 				skipDiffOnInstall: tc.skipDiffOnInstall,
 | |
| 				skipNeeds:         tc.fields.skipNeeds,
 | |
| 				includeNeeds:      tc.fields.includeNeeds,
 | |
| 			})
 | |
| 
 | |
| 			var gotErr string
 | |
| 			if syncErr != nil {
 | |
| 				gotErr = syncErr.Error()
 | |
| 			}
 | |
| 
 | |
| 			if d := cmp.Diff(tc.error, gotErr); d != "" {
 | |
| 				t.Fatalf("unexpected error: want (-), got (+): %s", d)
 | |
| 			}
 | |
| 
 | |
| 			if len(wantUpgrades) > len(helm.Releases) {
 | |
| 				t.Fatalf("insufficient number of upgrades: got %d, want %d", len(helm.Releases), len(wantUpgrades))
 | |
| 			}
 | |
| 
 | |
| 			for relIdx := range wantUpgrades {
 | |
| 				if wantUpgrades[relIdx].Name != helm.Releases[relIdx].Name {
 | |
| 					t.Errorf("releases[%d].name: got %q, want %q", relIdx, helm.Releases[relIdx].Name, wantUpgrades[relIdx].Name)
 | |
| 				}
 | |
| 				for flagIdx := range wantUpgrades[relIdx].Flags {
 | |
| 					if wantUpgrades[relIdx].Flags[flagIdx] != helm.Releases[relIdx].Flags[flagIdx] {
 | |
| 						t.Errorf("releaes[%d].flags[%d]: got %v, want %v", relIdx, flagIdx, helm.Releases[relIdx].Flags[flagIdx], wantUpgrades[relIdx].Flags[flagIdx])
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 
 | |
| 			if len(wantDeletes) > len(helm.Deleted) {
 | |
| 				t.Fatalf("insufficient number of deletes: got %d, want %d", len(helm.Deleted), len(wantDeletes))
 | |
| 			}
 | |
| 
 | |
| 			for relIdx := range wantDeletes {
 | |
| 				if wantDeletes[relIdx].Name != helm.Deleted[relIdx].Name {
 | |
| 					t.Errorf("releases[%d].name: got %q, want %q", relIdx, helm.Deleted[relIdx].Name, wantDeletes[relIdx].Name)
 | |
| 				}
 | |
| 				for flagIdx := range wantDeletes[relIdx].Flags {
 | |
| 					if wantDeletes[relIdx].Flags[flagIdx] != helm.Deleted[relIdx].Flags[flagIdx] {
 | |
| 						t.Errorf("releaes[%d].flags[%d]: got %v, want %v", relIdx, flagIdx, helm.Deleted[relIdx].Flags[flagIdx], wantDeletes[relIdx].Flags[flagIdx])
 | |
| 					}
 | |
| 				}
 | |
| 			}
 | |
| 		}()
 | |
| 
 | |
| 		if tc.log != "" {
 | |
| 			actual := bs.String()
 | |
| 
 | |
| 			diff, exists := testhelper.Diff(tc.log, actual, 3)
 | |
| 			if exists {
 | |
| 				t.Errorf("unexpected log:\nDIFF\n%s\nEOD", diff)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	t.Run("skip-needs=true", func(t *testing.T) {
 | |
| 		check(t, testcase{
 | |
| 			fields: fields{
 | |
| 				skipNeeds: true,
 | |
| 			},
 | |
| 			files: map[string]string{
 | |
| 				"/path/to/helmfile.yaml": `
 | |
| {{ $mark := "a" }}
 | |
| 
 | |
| releases:
 | |
| - name: kubernetes-external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: kube-system
 | |
| 
 | |
| - name: external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - kube-system/kubernetes-external-secrets
 | |
| 
 | |
| - name: my-release
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - default/external-secrets
 | |
| `,
 | |
| 			},
 | |
| 			selectors: []string{"app=test"},
 | |
| 			upgraded: []exectest.Release{
 | |
| 				{Name: "external-secrets", Flags: []string{"--kube-context", "default", "--namespace", "default"}},
 | |
| 				{Name: "my-release", Flags: []string{"--kube-context", "default", "--namespace", "default"}},
 | |
| 			},
 | |
| 			// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
 | |
| 			concurrency: 1,
 | |
| 			log: `processing file "helmfile.yaml" in directory "."
 | |
| first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
 | |
| first-pass uses: &{default map[] map[]}
 | |
| first-pass rendering output of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7: 
 | |
|  8: - name: external-secrets
 | |
|  9:   chart: incubator/raw
 | |
| 10:   namespace: default
 | |
| 11:   labels:
 | |
| 12:     app: test
 | |
| 13:   needs:
 | |
| 14:   - kube-system/kubernetes-external-secrets
 | |
| 15: 
 | |
| 16: - name: my-release
 | |
| 17:   chart: incubator/raw
 | |
| 18:   namespace: default
 | |
| 19:   labels:
 | |
| 20:     app: test
 | |
| 21:   needs:
 | |
| 22:   - default/external-secrets
 | |
| 23: 
 | |
| 
 | |
| first-pass produced: &{default map[] map[]}
 | |
| first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
 | |
| vals:
 | |
| map[]
 | |
| defaultVals:[]
 | |
| second-pass rendering result of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7: 
 | |
|  8: - name: external-secrets
 | |
|  9:   chart: incubator/raw
 | |
| 10:   namespace: default
 | |
| 11:   labels:
 | |
| 12:     app: test
 | |
| 13:   needs:
 | |
| 14:   - kube-system/kubernetes-external-secrets
 | |
| 15: 
 | |
| 16: - name: my-release
 | |
| 17:   chart: incubator/raw
 | |
| 18:   namespace: default
 | |
| 19:   labels:
 | |
| 20:     app: test
 | |
| 21:   needs:
 | |
| 22:   - default/external-secrets
 | |
| 23: 
 | |
| 
 | |
| merged environment: &{default map[] map[]}
 | |
| 2 release(s) matching app=test found in helmfile.yaml
 | |
| 
 | |
| Affected releases are:
 | |
|   external-secrets (incubator/raw) UPDATED
 | |
|   my-release (incubator/raw) UPDATED
 | |
| 
 | |
| processing 2 groups of releases in this order:
 | |
| GROUP RELEASES
 | |
| 1     default/external-secrets
 | |
| 2     default/my-release
 | |
| 
 | |
| processing releases in group 1/2: default/external-secrets
 | |
| getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deployed--failed--pending}
 | |
| processing releases in group 2/2: default/my-release
 | |
| getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deployed--failed--pending}
 | |
| 
 | |
| UPDATED RELEASES:
 | |
| NAME               CHART           VERSION
 | |
| external-secrets   incubator/raw          
 | |
| my-release         incubator/raw          
 | |
| 
 | |
| `,
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	t.Run("skip-needs=false include-needs=true", func(t *testing.T) {
 | |
| 		check(t, testcase{
 | |
| 			fields: fields{
 | |
| 				skipNeeds:    false,
 | |
| 				includeNeeds: true,
 | |
| 			},
 | |
| 			error: ``,
 | |
| 			files: map[string]string{
 | |
| 				"/path/to/helmfile.yaml": `
 | |
| {{ $mark := "a" }}
 | |
| 
 | |
| releases:
 | |
| - name: kubernetes-external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: kube-system
 | |
| 
 | |
| - name: external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - kube-system/kubernetes-external-secrets
 | |
| 
 | |
| - name: my-release
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - default/external-secrets
 | |
| `,
 | |
| 			},
 | |
| 			selectors: []string{"app=test"},
 | |
| 			upgraded:  []exectest.Release{},
 | |
| 			// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
 | |
| 			concurrency: 1,
 | |
| 			log: `processing file "helmfile.yaml" in directory "."
 | |
| first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
 | |
| first-pass uses: &{default map[] map[]}
 | |
| first-pass rendering output of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7: 
 | |
|  8: - name: external-secrets
 | |
|  9:   chart: incubator/raw
 | |
| 10:   namespace: default
 | |
| 11:   labels:
 | |
| 12:     app: test
 | |
| 13:   needs:
 | |
| 14:   - kube-system/kubernetes-external-secrets
 | |
| 15: 
 | |
| 16: - name: my-release
 | |
| 17:   chart: incubator/raw
 | |
| 18:   namespace: default
 | |
| 19:   labels:
 | |
| 20:     app: test
 | |
| 21:   needs:
 | |
| 22:   - default/external-secrets
 | |
| 23: 
 | |
| 
 | |
| first-pass produced: &{default map[] map[]}
 | |
| first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
 | |
| vals:
 | |
| map[]
 | |
| defaultVals:[]
 | |
| second-pass rendering result of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7: 
 | |
|  8: - name: external-secrets
 | |
|  9:   chart: incubator/raw
 | |
| 10:   namespace: default
 | |
| 11:   labels:
 | |
| 12:     app: test
 | |
| 13:   needs:
 | |
| 14:   - kube-system/kubernetes-external-secrets
 | |
| 15: 
 | |
| 16: - name: my-release
 | |
| 17:   chart: incubator/raw
 | |
| 18:   namespace: default
 | |
| 19:   labels:
 | |
| 20:     app: test
 | |
| 21:   needs:
 | |
| 22:   - default/external-secrets
 | |
| 23: 
 | |
| 
 | |
| merged environment: &{default map[] map[]}
 | |
| 2 release(s) matching app=test found in helmfile.yaml
 | |
| 
 | |
| Affected releases are:
 | |
|   external-secrets (incubator/raw) UPDATED
 | |
|   kubernetes-external-secrets (incubator/raw) UPDATED
 | |
|   my-release (incubator/raw) UPDATED
 | |
| 
 | |
| processing 3 groups of releases in this order:
 | |
| GROUP RELEASES
 | |
| 1     kube-system/kubernetes-external-secrets
 | |
| 2     default/external-secrets
 | |
| 3     default/my-release
 | |
| 
 | |
| processing releases in group 1/3: kube-system/kubernetes-external-secrets
 | |
| getting deployed release version failed:unexpected list key: {^kubernetes-external-secrets$ --kube-contextdefault--deployed--failed--pending}
 | |
| processing releases in group 2/3: default/external-secrets
 | |
| getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deployed--failed--pending}
 | |
| processing releases in group 3/3: default/my-release
 | |
| getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deployed--failed--pending}
 | |
| 
 | |
| UPDATED RELEASES:
 | |
| NAME                          CHART           VERSION
 | |
| kubernetes-external-secrets   incubator/raw          
 | |
| external-secrets              incubator/raw          
 | |
| my-release                    incubator/raw          
 | |
| 
 | |
| `,
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	t.Run("skip-needs=false include-needs=true with installed but disabled release", func(t *testing.T) {
 | |
| 		check(t, testcase{
 | |
| 			fields: fields{
 | |
| 				skipNeeds:    false,
 | |
| 				includeNeeds: true,
 | |
| 			},
 | |
| 			error: ``,
 | |
| 			files: map[string]string{
 | |
| 				"/path/to/helmfile.yaml": `
 | |
| {{ $mark := "a" }}
 | |
| 
 | |
| releases:
 | |
| - name: kubernetes-external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: kube-system
 | |
|   installed: false
 | |
| 
 | |
| - name: external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - kube-system/kubernetes-external-secrets
 | |
| 
 | |
| - name: my-release
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - default/external-secrets
 | |
| `,
 | |
| 			},
 | |
| 			selectors: []string{"app=test"},
 | |
| 			upgraded:  []exectest.Release{},
 | |
| 			lists: map[exectest.ListKey]string{
 | |
| 				// delete frontend-v1 and backend-v1
 | |
| 				exectest.ListKey{Filter: "^kubernetes-external-secrets$", Flags: "--kube-contextdefault--deployed--failed--pending"}: `NAME	REVISION	UPDATED                 	STATUS  	CHART        	APP VERSION	NAMESPACE
 | |
| ^kubernetes-external-secrets$ 	4       	Fri Nov  1 08:40:07 2019	DEPLOYED	backend-3.1.0	3.1.0      	default
 | |
| `,
 | |
| 			},
 | |
| 			// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
 | |
| 			concurrency: 1,
 | |
| 			log: `processing file "helmfile.yaml" in directory "."
 | |
| first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
 | |
| first-pass uses: &{default map[] map[]}
 | |
| first-pass rendering output of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7:   installed: false
 | |
|  8: 
 | |
|  9: - name: external-secrets
 | |
| 10:   chart: incubator/raw
 | |
| 11:   namespace: default
 | |
| 12:   labels:
 | |
| 13:     app: test
 | |
| 14:   needs:
 | |
| 15:   - kube-system/kubernetes-external-secrets
 | |
| 16: 
 | |
| 17: - name: my-release
 | |
| 18:   chart: incubator/raw
 | |
| 19:   namespace: default
 | |
| 20:   labels:
 | |
| 21:     app: test
 | |
| 22:   needs:
 | |
| 23:   - default/external-secrets
 | |
| 24: 
 | |
| 
 | |
| first-pass produced: &{default map[] map[]}
 | |
| first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
 | |
| vals:
 | |
| map[]
 | |
| defaultVals:[]
 | |
| second-pass rendering result of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7:   installed: false
 | |
|  8: 
 | |
|  9: - name: external-secrets
 | |
| 10:   chart: incubator/raw
 | |
| 11:   namespace: default
 | |
| 12:   labels:
 | |
| 13:     app: test
 | |
| 14:   needs:
 | |
| 15:   - kube-system/kubernetes-external-secrets
 | |
| 16: 
 | |
| 17: - name: my-release
 | |
| 18:   chart: incubator/raw
 | |
| 19:   namespace: default
 | |
| 20:   labels:
 | |
| 21:     app: test
 | |
| 22:   needs:
 | |
| 23:   - default/external-secrets
 | |
| 24: 
 | |
| 
 | |
| merged environment: &{default map[] map[]}
 | |
| 2 release(s) matching app=test found in helmfile.yaml
 | |
| 
 | |
| Affected releases are:
 | |
|   external-secrets (incubator/raw) UPDATED
 | |
|   kubernetes-external-secrets (incubator/raw) DELETED
 | |
|   my-release (incubator/raw) UPDATED
 | |
| 
 | |
| processing 1 groups of releases in this order:
 | |
| GROUP RELEASES
 | |
| 1     kube-system/kubernetes-external-secrets
 | |
| 
 | |
| processing releases in group 1/1: kube-system/kubernetes-external-secrets
 | |
| processing 2 groups of releases in this order:
 | |
| GROUP RELEASES
 | |
| 1     default/external-secrets
 | |
| 2     default/my-release
 | |
| 
 | |
| processing releases in group 1/2: default/external-secrets
 | |
| getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deployed--failed--pending}
 | |
| processing releases in group 2/2: default/my-release
 | |
| getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deployed--failed--pending}
 | |
| 
 | |
| UPDATED RELEASES:
 | |
| NAME               CHART           VERSION
 | |
| external-secrets   incubator/raw          
 | |
| my-release         incubator/raw          
 | |
| 
 | |
| 
 | |
| DELETED RELEASES:
 | |
| NAME
 | |
| kubernetes-external-secrets
 | |
| `,
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	t.Run("skip-needs=false include-needs=true with not installed and disabled release", func(t *testing.T) {
 | |
| 		check(t, testcase{
 | |
| 			fields: fields{
 | |
| 				skipNeeds:    false,
 | |
| 				includeNeeds: true,
 | |
| 			},
 | |
| 			error: ``,
 | |
| 			files: map[string]string{
 | |
| 				"/path/to/helmfile.yaml": `
 | |
| {{ $mark := "a" }}
 | |
| 
 | |
| releases:
 | |
| - name: kubernetes-external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: kube-system
 | |
|   installed: false
 | |
| 
 | |
| - name: external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - kube-system/kubernetes-external-secrets
 | |
| 
 | |
| - name: my-release
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - default/external-secrets
 | |
| `,
 | |
| 			},
 | |
| 			selectors: []string{"app=test"},
 | |
| 			upgraded:  []exectest.Release{},
 | |
| 			lists: map[exectest.ListKey]string{
 | |
| 				// delete frontend-v1 and backend-v1
 | |
| 				exectest.ListKey{Filter: "^kubernetes-external-secrets$", Flags: "--kube-contextdefault--deployed--failed--pending"}: ``,
 | |
| 			},
 | |
| 			// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
 | |
| 			concurrency: 1,
 | |
| 			log: `processing file "helmfile.yaml" in directory "."
 | |
| first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
 | |
| first-pass uses: &{default map[] map[]}
 | |
| first-pass rendering output of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7:   installed: false
 | |
|  8: 
 | |
|  9: - name: external-secrets
 | |
| 10:   chart: incubator/raw
 | |
| 11:   namespace: default
 | |
| 12:   labels:
 | |
| 13:     app: test
 | |
| 14:   needs:
 | |
| 15:   - kube-system/kubernetes-external-secrets
 | |
| 16: 
 | |
| 17: - name: my-release
 | |
| 18:   chart: incubator/raw
 | |
| 19:   namespace: default
 | |
| 20:   labels:
 | |
| 21:     app: test
 | |
| 22:   needs:
 | |
| 23:   - default/external-secrets
 | |
| 24: 
 | |
| 
 | |
| first-pass produced: &{default map[] map[]}
 | |
| first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
 | |
| vals:
 | |
| map[]
 | |
| defaultVals:[]
 | |
| second-pass rendering result of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7:   installed: false
 | |
|  8: 
 | |
|  9: - name: external-secrets
 | |
| 10:   chart: incubator/raw
 | |
| 11:   namespace: default
 | |
| 12:   labels:
 | |
| 13:     app: test
 | |
| 14:   needs:
 | |
| 15:   - kube-system/kubernetes-external-secrets
 | |
| 16: 
 | |
| 17: - name: my-release
 | |
| 18:   chart: incubator/raw
 | |
| 19:   namespace: default
 | |
| 20:   labels:
 | |
| 21:     app: test
 | |
| 22:   needs:
 | |
| 23:   - default/external-secrets
 | |
| 24: 
 | |
| 
 | |
| merged environment: &{default map[] map[]}
 | |
| 2 release(s) matching app=test found in helmfile.yaml
 | |
| 
 | |
| Affected releases are:
 | |
|   external-secrets (incubator/raw) UPDATED
 | |
|   my-release (incubator/raw) UPDATED
 | |
| 
 | |
| processing 2 groups of releases in this order:
 | |
| GROUP RELEASES
 | |
| 1     default/external-secrets
 | |
| 2     default/my-release
 | |
| 
 | |
| processing releases in group 1/2: default/external-secrets
 | |
| getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deployed--failed--pending}
 | |
| processing releases in group 2/2: default/my-release
 | |
| getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deployed--failed--pending}
 | |
| 
 | |
| UPDATED RELEASES:
 | |
| NAME               CHART           VERSION
 | |
| external-secrets   incubator/raw          
 | |
| my-release         incubator/raw          
 | |
| 
 | |
| `,
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	t.Run("bad --selector", func(t *testing.T) {
 | |
| 		check(t, testcase{
 | |
| 			files: map[string]string{
 | |
| 				"/path/to/helmfile.yaml": `
 | |
| {{ $mark := "a" }}
 | |
| 
 | |
| releases:
 | |
| - name: kubernetes-external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: kube-system
 | |
| 
 | |
| - name: external-secrets
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - kube-system/kubernetes-external-secrets
 | |
| 
 | |
| - name: my-release
 | |
|   chart: incubator/raw
 | |
|   namespace: default
 | |
|   labels:
 | |
|     app: test
 | |
|   needs:
 | |
|   - default/external-secrets
 | |
| `,
 | |
| 			},
 | |
| 			selectors: []string{"app=test_non_existent"},
 | |
| 			upgraded:  []exectest.Release{},
 | |
| 			error:     "err: no releases found that matches specified selector(app=test_non_existent) and environment(default), in any helmfile",
 | |
| 			// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
 | |
| 			concurrency: 1,
 | |
| 			log: `processing file "helmfile.yaml" in directory "."
 | |
| first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
 | |
| first-pass uses: &{default map[] map[]}
 | |
| first-pass rendering output of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7: 
 | |
|  8: - name: external-secrets
 | |
|  9:   chart: incubator/raw
 | |
| 10:   namespace: default
 | |
| 11:   labels:
 | |
| 12:     app: test
 | |
| 13:   needs:
 | |
| 14:   - kube-system/kubernetes-external-secrets
 | |
| 15: 
 | |
| 16: - name: my-release
 | |
| 17:   chart: incubator/raw
 | |
| 18:   namespace: default
 | |
| 19:   labels:
 | |
| 20:     app: test
 | |
| 21:   needs:
 | |
| 22:   - default/external-secrets
 | |
| 23: 
 | |
| 
 | |
| first-pass produced: &{default map[] map[]}
 | |
| first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
 | |
| vals:
 | |
| map[]
 | |
| defaultVals:[]
 | |
| second-pass rendering result of "helmfile.yaml.part.0":
 | |
|  0: 
 | |
|  1: 
 | |
|  2: 
 | |
|  3: releases:
 | |
|  4: - name: kubernetes-external-secrets
 | |
|  5:   chart: incubator/raw
 | |
|  6:   namespace: kube-system
 | |
|  7: 
 | |
|  8: - name: external-secrets
 | |
|  9:   chart: incubator/raw
 | |
| 10:   namespace: default
 | |
| 11:   labels:
 | |
| 12:     app: test
 | |
| 13:   needs:
 | |
| 14:   - kube-system/kubernetes-external-secrets
 | |
| 15: 
 | |
| 16: - name: my-release
 | |
| 17:   chart: incubator/raw
 | |
| 18:   namespace: default
 | |
| 19:   labels:
 | |
| 20:     app: test
 | |
| 21:   needs:
 | |
| 22:   - default/external-secrets
 | |
| 23: 
 | |
| 
 | |
| merged environment: &{default map[] map[]}
 | |
| 0 release(s) matching app=test_non_existent found in helmfile.yaml
 | |
| 
 | |
| `,
 | |
| 		})
 | |
| 	})
 | |
| }
 |