911 lines
24 KiB
Go
911 lines
24 KiB
Go
package app
|
|
|
|
import (
|
|
"bufio"
|
|
"bytes"
|
|
"io"
|
|
"path/filepath"
|
|
"sync"
|
|
"testing"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
"github.com/helmfile/helmfile/pkg/exectest"
|
|
"github.com/helmfile/helmfile/pkg/helmexec"
|
|
"github.com/helmfile/helmfile/pkg/testhelper"
|
|
"github.com/variantdev/vals"
|
|
)
|
|
|
|
func TestSync(t *testing.T) {
|
|
type fields struct {
|
|
skipNeeds bool
|
|
includeNeeds bool
|
|
includeTransitiveNeeds bool
|
|
}
|
|
|
|
type testcase struct {
|
|
fields fields
|
|
ns string
|
|
concurrency int
|
|
skipDiffOnInstall bool
|
|
error string
|
|
files map[string]string
|
|
selectors []string
|
|
lists map[exectest.ListKey]string
|
|
upgraded []exectest.Release
|
|
deleted []exectest.Release
|
|
log string
|
|
}
|
|
|
|
check := func(t *testing.T, tc testcase) {
|
|
t.Helper()
|
|
|
|
wantUpgrades := tc.upgraded
|
|
wantDeletes := tc.deleted
|
|
|
|
var helm = &exectest.Helm{
|
|
FailOnUnexpectedList: true,
|
|
FailOnUnexpectedDiff: true,
|
|
Lists: tc.lists,
|
|
DiffMutex: &sync.Mutex{},
|
|
ChartsMutex: &sync.Mutex{},
|
|
ReleasesMutex: &sync.Mutex{},
|
|
}
|
|
|
|
bs := &bytes.Buffer{}
|
|
|
|
func() {
|
|
t.Helper()
|
|
|
|
logReader, logWriter := io.Pipe()
|
|
|
|
logFlushed := &sync.WaitGroup{}
|
|
// Ensure all the log is consumed into `bs` by calling `logWriter.Close()` followed by `logFlushed.Wait()`
|
|
logFlushed.Add(1)
|
|
go func() {
|
|
scanner := bufio.NewScanner(logReader)
|
|
for scanner.Scan() {
|
|
bs.Write(scanner.Bytes())
|
|
bs.WriteString("\n")
|
|
}
|
|
logFlushed.Done()
|
|
}()
|
|
|
|
defer func() {
|
|
// This is here to avoid data-trace on bytes buffer `bs` to capture logs
|
|
if err := logWriter.Close(); err != nil {
|
|
panic(err)
|
|
}
|
|
logFlushed.Wait()
|
|
}()
|
|
|
|
logger := helmexec.NewLogger(logWriter, "debug")
|
|
|
|
valsRuntime, err := vals.New(vals.Options{CacheSize: 32})
|
|
if err != nil {
|
|
t.Errorf("unexpected error creating vals runtime: %v", err)
|
|
}
|
|
|
|
app := appWithFs(&App{
|
|
OverrideHelmBinary: DefaultHelmBinary,
|
|
glob: filepath.Glob,
|
|
abs: filepath.Abs,
|
|
OverrideKubeContext: "default",
|
|
Env: "default",
|
|
Logger: logger,
|
|
helms: map[helmKey]helmexec.Interface{
|
|
createHelmKey("helm", "default"): helm,
|
|
},
|
|
valsRuntime: valsRuntime,
|
|
}, tc.files)
|
|
|
|
if tc.ns != "" {
|
|
app.Namespace = tc.ns
|
|
}
|
|
|
|
if tc.selectors != nil {
|
|
app.Selectors = tc.selectors
|
|
}
|
|
|
|
syncErr := app.Sync(applyConfig{
|
|
// if we check log output, concurrency must be 1. otherwise the test becomes non-deterministic.
|
|
concurrency: tc.concurrency,
|
|
logger: logger,
|
|
skipDiffOnInstall: tc.skipDiffOnInstall,
|
|
skipNeeds: tc.fields.skipNeeds,
|
|
includeNeeds: tc.fields.includeNeeds,
|
|
includeTransitiveNeeds: tc.fields.includeTransitiveNeeds,
|
|
})
|
|
|
|
var gotErr string
|
|
if syncErr != nil {
|
|
gotErr = syncErr.Error()
|
|
}
|
|
|
|
if d := cmp.Diff(tc.error, gotErr); d != "" {
|
|
t.Fatalf("unexpected error: want (-), got (+): %s", d)
|
|
}
|
|
|
|
if len(wantUpgrades) > len(helm.Releases) {
|
|
t.Fatalf("insufficient number of upgrades: got %d, want %d", len(helm.Releases), len(wantUpgrades))
|
|
}
|
|
|
|
for relIdx := range wantUpgrades {
|
|
if wantUpgrades[relIdx].Name != helm.Releases[relIdx].Name {
|
|
t.Errorf("releases[%d].name: got %q, want %q", relIdx, helm.Releases[relIdx].Name, wantUpgrades[relIdx].Name)
|
|
}
|
|
for flagIdx := range wantUpgrades[relIdx].Flags {
|
|
if wantUpgrades[relIdx].Flags[flagIdx] != helm.Releases[relIdx].Flags[flagIdx] {
|
|
t.Errorf("releaes[%d].flags[%d]: got %v, want %v", relIdx, flagIdx, helm.Releases[relIdx].Flags[flagIdx], wantUpgrades[relIdx].Flags[flagIdx])
|
|
}
|
|
}
|
|
}
|
|
|
|
if len(wantDeletes) > len(helm.Deleted) {
|
|
t.Fatalf("insufficient number of deletes: got %d, want %d", len(helm.Deleted), len(wantDeletes))
|
|
}
|
|
|
|
for relIdx := range wantDeletes {
|
|
if wantDeletes[relIdx].Name != helm.Deleted[relIdx].Name {
|
|
t.Errorf("releases[%d].name: got %q, want %q", relIdx, helm.Deleted[relIdx].Name, wantDeletes[relIdx].Name)
|
|
}
|
|
for flagIdx := range wantDeletes[relIdx].Flags {
|
|
if wantDeletes[relIdx].Flags[flagIdx] != helm.Deleted[relIdx].Flags[flagIdx] {
|
|
t.Errorf("releaes[%d].flags[%d]: got %v, want %v", relIdx, flagIdx, helm.Deleted[relIdx].Flags[flagIdx], wantDeletes[relIdx].Flags[flagIdx])
|
|
}
|
|
}
|
|
}
|
|
}()
|
|
|
|
if tc.log != "" {
|
|
actual := bs.String()
|
|
|
|
diff, exists := testhelper.Diff(tc.log, actual, 3)
|
|
if exists {
|
|
t.Errorf("unexpected log:\nDIFF\n%s\nEOD", diff)
|
|
}
|
|
}
|
|
}
|
|
|
|
t.Run("skip-needs=true", func(t *testing.T) {
|
|
check(t, testcase{
|
|
fields: fields{
|
|
skipNeeds: true,
|
|
},
|
|
files: map[string]string{
|
|
"/path/to/helmfile.yaml": `
|
|
{{ $mark := "a" }}
|
|
|
|
releases:
|
|
- name: kubernetes-external-secrets
|
|
chart: incubator/raw
|
|
namespace: kube-system
|
|
|
|
- name: external-secrets
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- kube-system/kubernetes-external-secrets
|
|
|
|
- name: my-release
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- default/external-secrets
|
|
`,
|
|
},
|
|
selectors: []string{"app=test"},
|
|
upgraded: []exectest.Release{
|
|
{Name: "external-secrets", Flags: []string{"--kube-context", "default", "--namespace", "default"}},
|
|
{Name: "my-release", Flags: []string{"--kube-context", "default", "--namespace", "default"}},
|
|
},
|
|
// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
|
|
concurrency: 1,
|
|
log: `processing file "helmfile.yaml" in directory "."
|
|
first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
|
|
first-pass uses: &{default map[] map[]}
|
|
first-pass rendering output of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7:
|
|
8: - name: external-secrets
|
|
9: chart: incubator/raw
|
|
10: namespace: default
|
|
11: labels:
|
|
12: app: test
|
|
13: needs:
|
|
14: - kube-system/kubernetes-external-secrets
|
|
15:
|
|
16: - name: my-release
|
|
17: chart: incubator/raw
|
|
18: namespace: default
|
|
19: labels:
|
|
20: app: test
|
|
21: needs:
|
|
22: - default/external-secrets
|
|
23:
|
|
|
|
first-pass produced: &{default map[] map[]}
|
|
first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
|
|
vals:
|
|
map[]
|
|
defaultVals:[]
|
|
second-pass rendering result of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7:
|
|
8: - name: external-secrets
|
|
9: chart: incubator/raw
|
|
10: namespace: default
|
|
11: labels:
|
|
12: app: test
|
|
13: needs:
|
|
14: - kube-system/kubernetes-external-secrets
|
|
15:
|
|
16: - name: my-release
|
|
17: chart: incubator/raw
|
|
18: namespace: default
|
|
19: labels:
|
|
20: app: test
|
|
21: needs:
|
|
22: - default/external-secrets
|
|
23:
|
|
|
|
merged environment: &{default map[] map[]}
|
|
2 release(s) matching app=test found in helmfile.yaml
|
|
|
|
Affected releases are:
|
|
external-secrets (incubator/raw) UPDATED
|
|
my-release (incubator/raw) UPDATED
|
|
|
|
processing 2 groups of releases in this order:
|
|
GROUP RELEASES
|
|
1 default/default/external-secrets
|
|
2 default/default/my-release
|
|
|
|
processing releases in group 1/2: default/default/external-secrets
|
|
getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 2/2: default/default/my-release
|
|
getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
|
|
UPDATED RELEASES:
|
|
NAME CHART VERSION
|
|
external-secrets incubator/raw
|
|
my-release incubator/raw
|
|
|
|
`,
|
|
})
|
|
})
|
|
|
|
t.Run("skip-needs=false include-needs=true", func(t *testing.T) {
|
|
check(t, testcase{
|
|
fields: fields{
|
|
skipNeeds: false,
|
|
includeNeeds: true,
|
|
},
|
|
error: ``,
|
|
files: map[string]string{
|
|
"/path/to/helmfile.yaml": `
|
|
{{ $mark := "a" }}
|
|
|
|
releases:
|
|
- name: kubernetes-external-secrets
|
|
chart: incubator/raw
|
|
namespace: kube-system
|
|
|
|
- name: external-secrets
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- kube-system/kubernetes-external-secrets
|
|
|
|
- name: my-release
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- default/external-secrets
|
|
`,
|
|
},
|
|
selectors: []string{"app=test"},
|
|
upgraded: []exectest.Release{},
|
|
// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
|
|
concurrency: 1,
|
|
log: `processing file "helmfile.yaml" in directory "."
|
|
first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
|
|
first-pass uses: &{default map[] map[]}
|
|
first-pass rendering output of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7:
|
|
8: - name: external-secrets
|
|
9: chart: incubator/raw
|
|
10: namespace: default
|
|
11: labels:
|
|
12: app: test
|
|
13: needs:
|
|
14: - kube-system/kubernetes-external-secrets
|
|
15:
|
|
16: - name: my-release
|
|
17: chart: incubator/raw
|
|
18: namespace: default
|
|
19: labels:
|
|
20: app: test
|
|
21: needs:
|
|
22: - default/external-secrets
|
|
23:
|
|
|
|
first-pass produced: &{default map[] map[]}
|
|
first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
|
|
vals:
|
|
map[]
|
|
defaultVals:[]
|
|
second-pass rendering result of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7:
|
|
8: - name: external-secrets
|
|
9: chart: incubator/raw
|
|
10: namespace: default
|
|
11: labels:
|
|
12: app: test
|
|
13: needs:
|
|
14: - kube-system/kubernetes-external-secrets
|
|
15:
|
|
16: - name: my-release
|
|
17: chart: incubator/raw
|
|
18: namespace: default
|
|
19: labels:
|
|
20: app: test
|
|
21: needs:
|
|
22: - default/external-secrets
|
|
23:
|
|
|
|
merged environment: &{default map[] map[]}
|
|
2 release(s) matching app=test found in helmfile.yaml
|
|
|
|
Affected releases are:
|
|
external-secrets (incubator/raw) UPDATED
|
|
kubernetes-external-secrets (incubator/raw) UPDATED
|
|
my-release (incubator/raw) UPDATED
|
|
|
|
processing 3 groups of releases in this order:
|
|
GROUP RELEASES
|
|
1 default/kube-system/kubernetes-external-secrets
|
|
2 default/default/external-secrets
|
|
3 default/default/my-release
|
|
|
|
processing releases in group 1/3: default/kube-system/kubernetes-external-secrets
|
|
getting deployed release version failed:unexpected list key: {^kubernetes-external-secrets$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 2/3: default/default/external-secrets
|
|
getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 3/3: default/default/my-release
|
|
getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
|
|
UPDATED RELEASES:
|
|
NAME CHART VERSION
|
|
kubernetes-external-secrets incubator/raw
|
|
external-secrets incubator/raw
|
|
my-release incubator/raw
|
|
|
|
`,
|
|
})
|
|
})
|
|
|
|
t.Run("include-transitive-needs=true", func(t *testing.T) {
|
|
check(t, testcase{
|
|
fields: fields{
|
|
skipNeeds: false,
|
|
includeTransitiveNeeds: true,
|
|
},
|
|
error: ``,
|
|
files: map[string]string{
|
|
"/path/to/helmfile.yaml": `
|
|
{{ $mark := "a" }}
|
|
|
|
releases:
|
|
- name: serviceA
|
|
chart: my/chart
|
|
needs:
|
|
- serviceB
|
|
|
|
- name: serviceB
|
|
chart: my/chart
|
|
needs:
|
|
- serviceC
|
|
|
|
- name: serviceC
|
|
chart: my/chart
|
|
|
|
- name: serviceD
|
|
chart: my/chart
|
|
`,
|
|
},
|
|
selectors: []string{"name=serviceA"},
|
|
upgraded: []exectest.Release{},
|
|
// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
|
|
concurrency: 1,
|
|
log: `processing file "helmfile.yaml" in directory "."
|
|
first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
|
|
first-pass uses: &{default map[] map[]}
|
|
first-pass rendering output of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: serviceA
|
|
5: chart: my/chart
|
|
6: needs:
|
|
7: - serviceB
|
|
8:
|
|
9: - name: serviceB
|
|
10: chart: my/chart
|
|
11: needs:
|
|
12: - serviceC
|
|
13:
|
|
14: - name: serviceC
|
|
15: chart: my/chart
|
|
16:
|
|
17: - name: serviceD
|
|
18: chart: my/chart
|
|
19:
|
|
|
|
first-pass produced: &{default map[] map[]}
|
|
first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
|
|
vals:
|
|
map[]
|
|
defaultVals:[]
|
|
second-pass rendering result of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: serviceA
|
|
5: chart: my/chart
|
|
6: needs:
|
|
7: - serviceB
|
|
8:
|
|
9: - name: serviceB
|
|
10: chart: my/chart
|
|
11: needs:
|
|
12: - serviceC
|
|
13:
|
|
14: - name: serviceC
|
|
15: chart: my/chart
|
|
16:
|
|
17: - name: serviceD
|
|
18: chart: my/chart
|
|
19:
|
|
|
|
merged environment: &{default map[] map[]}
|
|
3 release(s) matching name=serviceA found in helmfile.yaml
|
|
|
|
Affected releases are:
|
|
serviceA (my/chart) UPDATED
|
|
serviceB (my/chart) UPDATED
|
|
serviceC (my/chart) UPDATED
|
|
|
|
processing 3 groups of releases in this order:
|
|
GROUP RELEASES
|
|
1 default//serviceC
|
|
2 default//serviceB
|
|
3 default//serviceA
|
|
|
|
processing releases in group 1/3: default//serviceC
|
|
getting deployed release version failed:unexpected list key: {^serviceC$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 2/3: default//serviceB
|
|
getting deployed release version failed:unexpected list key: {^serviceB$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 3/3: default//serviceA
|
|
getting deployed release version failed:unexpected list key: {^serviceA$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
|
|
UPDATED RELEASES:
|
|
NAME CHART VERSION
|
|
serviceC my/chart
|
|
serviceB my/chart
|
|
serviceA my/chart
|
|
|
|
`,
|
|
})
|
|
})
|
|
|
|
t.Run("skip-needs=false include-needs=true with installed but disabled release", func(t *testing.T) {
|
|
check(t, testcase{
|
|
fields: fields{
|
|
skipNeeds: false,
|
|
includeNeeds: true,
|
|
includeTransitiveNeeds: false,
|
|
},
|
|
error: ``,
|
|
files: map[string]string{
|
|
"/path/to/helmfile.yaml": `
|
|
{{ $mark := "a" }}
|
|
|
|
releases:
|
|
- name: kubernetes-external-secrets
|
|
chart: incubator/raw
|
|
namespace: kube-system
|
|
installed: false
|
|
|
|
- name: external-secrets
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- kube-system/kubernetes-external-secrets
|
|
|
|
- name: my-release
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- default/external-secrets
|
|
`,
|
|
},
|
|
selectors: []string{"app=test"},
|
|
upgraded: []exectest.Release{},
|
|
lists: map[exectest.ListKey]string{
|
|
// delete frontend-v1 and backend-v1
|
|
{Filter: "^kubernetes-external-secrets$", Flags: helmV2ListFlags}: `NAME REVISION UPDATED STATUS CHART APP VERSION NAMESPACE
|
|
^kubernetes-external-secrets$ 4 Fri Nov 1 08:40:07 2019 DEPLOYED backend-3.1.0 3.1.0 default
|
|
`,
|
|
},
|
|
// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
|
|
concurrency: 1,
|
|
log: `processing file "helmfile.yaml" in directory "."
|
|
first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
|
|
first-pass uses: &{default map[] map[]}
|
|
first-pass rendering output of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7: installed: false
|
|
8:
|
|
9: - name: external-secrets
|
|
10: chart: incubator/raw
|
|
11: namespace: default
|
|
12: labels:
|
|
13: app: test
|
|
14: needs:
|
|
15: - kube-system/kubernetes-external-secrets
|
|
16:
|
|
17: - name: my-release
|
|
18: chart: incubator/raw
|
|
19: namespace: default
|
|
20: labels:
|
|
21: app: test
|
|
22: needs:
|
|
23: - default/external-secrets
|
|
24:
|
|
|
|
first-pass produced: &{default map[] map[]}
|
|
first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
|
|
vals:
|
|
map[]
|
|
defaultVals:[]
|
|
second-pass rendering result of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7: installed: false
|
|
8:
|
|
9: - name: external-secrets
|
|
10: chart: incubator/raw
|
|
11: namespace: default
|
|
12: labels:
|
|
13: app: test
|
|
14: needs:
|
|
15: - kube-system/kubernetes-external-secrets
|
|
16:
|
|
17: - name: my-release
|
|
18: chart: incubator/raw
|
|
19: namespace: default
|
|
20: labels:
|
|
21: app: test
|
|
22: needs:
|
|
23: - default/external-secrets
|
|
24:
|
|
|
|
merged environment: &{default map[] map[]}
|
|
2 release(s) matching app=test found in helmfile.yaml
|
|
|
|
Affected releases are:
|
|
external-secrets (incubator/raw) UPDATED
|
|
kubernetes-external-secrets (incubator/raw) DELETED
|
|
my-release (incubator/raw) UPDATED
|
|
|
|
processing 1 groups of releases in this order:
|
|
GROUP RELEASES
|
|
1 default/kube-system/kubernetes-external-secrets
|
|
|
|
processing releases in group 1/1: default/kube-system/kubernetes-external-secrets
|
|
processing 2 groups of releases in this order:
|
|
GROUP RELEASES
|
|
1 default/default/external-secrets
|
|
2 default/default/my-release
|
|
|
|
processing releases in group 1/2: default/default/external-secrets
|
|
getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 2/2: default/default/my-release
|
|
getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
|
|
UPDATED RELEASES:
|
|
NAME CHART VERSION
|
|
external-secrets incubator/raw
|
|
my-release incubator/raw
|
|
|
|
|
|
DELETED RELEASES:
|
|
NAME
|
|
kubernetes-external-secrets
|
|
`,
|
|
})
|
|
})
|
|
|
|
t.Run("skip-needs=false include-needs=true with not installed and disabled release", func(t *testing.T) {
|
|
check(t, testcase{
|
|
fields: fields{
|
|
skipNeeds: false,
|
|
includeTransitiveNeeds: false,
|
|
includeNeeds: true,
|
|
},
|
|
error: ``,
|
|
files: map[string]string{
|
|
"/path/to/helmfile.yaml": `
|
|
{{ $mark := "a" }}
|
|
|
|
releases:
|
|
- name: kubernetes-external-secrets
|
|
chart: incubator/raw
|
|
namespace: kube-system
|
|
installed: false
|
|
|
|
- name: external-secrets
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- kube-system/kubernetes-external-secrets
|
|
|
|
- name: my-release
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- default/external-secrets
|
|
`,
|
|
},
|
|
selectors: []string{"app=test"},
|
|
upgraded: []exectest.Release{},
|
|
lists: map[exectest.ListKey]string{
|
|
// delete frontend-v1 and backend-v1
|
|
{Filter: "^kubernetes-external-secrets$", Flags: helmV2ListFlags}: ``,
|
|
},
|
|
// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
|
|
concurrency: 1,
|
|
log: `processing file "helmfile.yaml" in directory "."
|
|
first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
|
|
first-pass uses: &{default map[] map[]}
|
|
first-pass rendering output of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7: installed: false
|
|
8:
|
|
9: - name: external-secrets
|
|
10: chart: incubator/raw
|
|
11: namespace: default
|
|
12: labels:
|
|
13: app: test
|
|
14: needs:
|
|
15: - kube-system/kubernetes-external-secrets
|
|
16:
|
|
17: - name: my-release
|
|
18: chart: incubator/raw
|
|
19: namespace: default
|
|
20: labels:
|
|
21: app: test
|
|
22: needs:
|
|
23: - default/external-secrets
|
|
24:
|
|
|
|
first-pass produced: &{default map[] map[]}
|
|
first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
|
|
vals:
|
|
map[]
|
|
defaultVals:[]
|
|
second-pass rendering result of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7: installed: false
|
|
8:
|
|
9: - name: external-secrets
|
|
10: chart: incubator/raw
|
|
11: namespace: default
|
|
12: labels:
|
|
13: app: test
|
|
14: needs:
|
|
15: - kube-system/kubernetes-external-secrets
|
|
16:
|
|
17: - name: my-release
|
|
18: chart: incubator/raw
|
|
19: namespace: default
|
|
20: labels:
|
|
21: app: test
|
|
22: needs:
|
|
23: - default/external-secrets
|
|
24:
|
|
|
|
merged environment: &{default map[] map[]}
|
|
2 release(s) matching app=test found in helmfile.yaml
|
|
|
|
Affected releases are:
|
|
external-secrets (incubator/raw) UPDATED
|
|
my-release (incubator/raw) UPDATED
|
|
|
|
processing 2 groups of releases in this order:
|
|
GROUP RELEASES
|
|
1 default/default/external-secrets
|
|
2 default/default/my-release
|
|
|
|
processing releases in group 1/2: default/default/external-secrets
|
|
getting deployed release version failed:unexpected list key: {^external-secrets$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
processing releases in group 2/2: default/default/my-release
|
|
getting deployed release version failed:unexpected list key: {^my-release$ --kube-contextdefault--deleting--deployed--failed--pending}
|
|
|
|
UPDATED RELEASES:
|
|
NAME CHART VERSION
|
|
external-secrets incubator/raw
|
|
my-release incubator/raw
|
|
|
|
`,
|
|
})
|
|
})
|
|
|
|
t.Run("bad --selector", func(t *testing.T) {
|
|
check(t, testcase{
|
|
files: map[string]string{
|
|
"/path/to/helmfile.yaml": `
|
|
{{ $mark := "a" }}
|
|
|
|
releases:
|
|
- name: kubernetes-external-secrets
|
|
chart: incubator/raw
|
|
namespace: kube-system
|
|
|
|
- name: external-secrets
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- kube-system/kubernetes-external-secrets
|
|
|
|
- name: my-release
|
|
chart: incubator/raw
|
|
namespace: default
|
|
labels:
|
|
app: test
|
|
needs:
|
|
- default/external-secrets
|
|
`,
|
|
},
|
|
selectors: []string{"app=test_non_existent"},
|
|
upgraded: []exectest.Release{},
|
|
error: "err: no releases found that matches specified selector(app=test_non_existent) and environment(default), in any helmfile",
|
|
// as we check for log output, set concurrency to 1 to avoid non-deterministic test result
|
|
concurrency: 1,
|
|
log: `processing file "helmfile.yaml" in directory "."
|
|
first-pass rendering starting for "helmfile.yaml.part.0": inherited=&{default map[] map[]}, overrode=<nil>
|
|
first-pass uses: &{default map[] map[]}
|
|
first-pass rendering output of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7:
|
|
8: - name: external-secrets
|
|
9: chart: incubator/raw
|
|
10: namespace: default
|
|
11: labels:
|
|
12: app: test
|
|
13: needs:
|
|
14: - kube-system/kubernetes-external-secrets
|
|
15:
|
|
16: - name: my-release
|
|
17: chart: incubator/raw
|
|
18: namespace: default
|
|
19: labels:
|
|
20: app: test
|
|
21: needs:
|
|
22: - default/external-secrets
|
|
23:
|
|
|
|
first-pass produced: &{default map[] map[]}
|
|
first-pass rendering result of "helmfile.yaml.part.0": {default map[] map[]}
|
|
vals:
|
|
map[]
|
|
defaultVals:[]
|
|
second-pass rendering result of "helmfile.yaml.part.0":
|
|
0:
|
|
1:
|
|
2:
|
|
3: releases:
|
|
4: - name: kubernetes-external-secrets
|
|
5: chart: incubator/raw
|
|
6: namespace: kube-system
|
|
7:
|
|
8: - name: external-secrets
|
|
9: chart: incubator/raw
|
|
10: namespace: default
|
|
11: labels:
|
|
12: app: test
|
|
13: needs:
|
|
14: - kube-system/kubernetes-external-secrets
|
|
15:
|
|
16: - name: my-release
|
|
17: chart: incubator/raw
|
|
18: namespace: default
|
|
19: labels:
|
|
20: app: test
|
|
21: needs:
|
|
22: - default/external-secrets
|
|
23:
|
|
|
|
merged environment: &{default map[] map[]}
|
|
0 release(s) matching app=test_non_existent found in helmfile.yaml
|
|
|
|
`,
|
|
})
|
|
})
|
|
}
|