parent
d0b02de429
commit
54454d9a02
|
|
@ -46,7 +46,7 @@ func TestConfiguration(t *testing.T) {
|
|||
VolumeSource: corev1.VolumeSource{
|
||||
ConfigMap: &corev1.ConfigMapVolumeSource{
|
||||
LocalObjectReference: corev1.LocalObjectReference{
|
||||
Name: resources.GetUserConfigurationConfigMapName(jenkinsCRName),
|
||||
Name: userConfigurationConfigMapName,
|
||||
},
|
||||
},
|
||||
},
|
||||
|
|
@ -55,15 +55,15 @@ func TestConfiguration(t *testing.T) {
|
|||
Name: "test-secret",
|
||||
VolumeSource: corev1.VolumeSource{
|
||||
Secret: &corev1.SecretVolumeSource{
|
||||
SecretName: resources.GetUserConfigurationSecretName(jenkinsCRName),
|
||||
SecretName: userConfigurationSecretName,
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
// base
|
||||
createUserConfigurationSecret(t, jenkinsCRName, namespace, systemMessageEnvName, systemMessage)
|
||||
createUserConfigurationConfigMap(t, jenkinsCRName, namespace, numberOfExecutors, fmt.Sprintf("${%s}", systemMessageEnvName))
|
||||
createUserConfigurationSecret(t, namespace, systemMessageEnvName, systemMessage)
|
||||
createUserConfigurationConfigMap(t, namespace, numberOfExecutors, fmt.Sprintf("${%s}", systemMessageEnvName))
|
||||
jenkins := createJenkinsCR(t, jenkinsCRName, namespace, &[]v1alpha2.SeedJob{mySeedJob.SeedJob}, volumes)
|
||||
createDefaultLimitsForContainersInNamespace(t, namespace)
|
||||
createKubernetesCredentialsProviderSecret(t, namespace, mySeedJob)
|
||||
|
|
@ -79,10 +79,10 @@ func TestConfiguration(t *testing.T) {
|
|||
verifyJenkinsSeedJobs(t, client, []seedJobConfig{mySeedJob})
|
||||
}
|
||||
|
||||
func createUserConfigurationSecret(t *testing.T, jenkinsCRName string, namespace string, systemMessageEnvName, systemMessage string) {
|
||||
func createUserConfigurationSecret(t *testing.T, namespace string, systemMessageEnvName, systemMessage string) {
|
||||
userConfiguration := &corev1.Secret{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: resources.GetUserConfigurationSecretName(jenkinsCRName),
|
||||
Name: userConfigurationSecretName,
|
||||
Namespace: namespace,
|
||||
},
|
||||
StringData: map[string]string{
|
||||
|
|
@ -96,10 +96,10 @@ func createUserConfigurationSecret(t *testing.T, jenkinsCRName string, namespace
|
|||
}
|
||||
}
|
||||
|
||||
func createUserConfigurationConfigMap(t *testing.T, jenkinsCRName string, namespace string, numberOfExecutors int, systemMessage string) {
|
||||
func createUserConfigurationConfigMap(t *testing.T, namespace string, numberOfExecutors int, systemMessage string) {
|
||||
userConfiguration := &corev1.ConfigMap{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: resources.GetUserConfigurationConfigMapName(jenkinsCRName),
|
||||
Name: userConfigurationConfigMapName,
|
||||
Namespace: namespace,
|
||||
},
|
||||
Data: map[string]string{
|
||||
|
|
|
|||
|
|
@ -17,6 +17,11 @@ import (
|
|||
"k8s.io/apimachinery/pkg/util/intstr"
|
||||
)
|
||||
|
||||
const (
|
||||
userConfigurationConfigMapName = "user-config"
|
||||
userConfigurationSecretName = "user-secret"
|
||||
)
|
||||
|
||||
func getJenkins(t *testing.T, namespace, name string) *v1alpha2.Jenkins {
|
||||
jenkins := &v1alpha2.Jenkins{}
|
||||
namespaceName := types.NamespacedName{Namespace: namespace, Name: name}
|
||||
|
|
|
|||
|
|
@ -6,7 +6,6 @@ import (
|
|||
|
||||
"github.com/jenkinsci/kubernetes-operator/pkg/apis/jenkins/v1alpha2"
|
||||
jenkinsclient "github.com/jenkinsci/kubernetes-operator/pkg/controller/jenkins/client"
|
||||
"github.com/jenkinsci/kubernetes-operator/pkg/controller/jenkins/configuration/base/resources"
|
||||
|
||||
framework "github.com/operator-framework/operator-sdk/pkg/test"
|
||||
"github.com/stretchr/testify/require"
|
||||
|
|
@ -36,7 +35,7 @@ func TestSafeRestart(t *testing.T) {
|
|||
defer ctx.Cleanup()
|
||||
|
||||
jenkinsCRName := "e2e"
|
||||
configureAuthorizationToUnSecure(t, jenkinsCRName, namespace)
|
||||
configureAuthorizationToUnSecure(t, namespace)
|
||||
jenkins := createJenkinsCR(t, jenkinsCRName, namespace, nil, []corev1.Volume{})
|
||||
waitForJenkinsBaseConfigurationToComplete(t, jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(t, jenkins)
|
||||
|
|
@ -50,10 +49,10 @@ func TestSafeRestart(t *testing.T) {
|
|||
checkIfAuthorizationStrategyUnsecuredIsSet(t, jenkinsClient)
|
||||
}
|
||||
|
||||
func configureAuthorizationToUnSecure(t *testing.T, jenkinsCRName, namespace string) {
|
||||
func configureAuthorizationToUnSecure(t *testing.T, namespace string) {
|
||||
limitRange := &corev1.ConfigMap{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: resources.GetUserConfigurationConfigMapName(jenkinsCRName),
|
||||
Name: userConfigurationConfigMapName,
|
||||
Namespace: namespace,
|
||||
},
|
||||
Data: map[string]string{
|
||||
|
|
|
|||
Loading…
Reference in New Issue