parent
d0b02de429
commit
54454d9a02
|
|
@ -46,7 +46,7 @@ func TestConfiguration(t *testing.T) {
|
||||||
VolumeSource: corev1.VolumeSource{
|
VolumeSource: corev1.VolumeSource{
|
||||||
ConfigMap: &corev1.ConfigMapVolumeSource{
|
ConfigMap: &corev1.ConfigMapVolumeSource{
|
||||||
LocalObjectReference: corev1.LocalObjectReference{
|
LocalObjectReference: corev1.LocalObjectReference{
|
||||||
Name: resources.GetUserConfigurationConfigMapName(jenkinsCRName),
|
Name: userConfigurationConfigMapName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
@ -55,15 +55,15 @@ func TestConfiguration(t *testing.T) {
|
||||||
Name: "test-secret",
|
Name: "test-secret",
|
||||||
VolumeSource: corev1.VolumeSource{
|
VolumeSource: corev1.VolumeSource{
|
||||||
Secret: &corev1.SecretVolumeSource{
|
Secret: &corev1.SecretVolumeSource{
|
||||||
SecretName: resources.GetUserConfigurationSecretName(jenkinsCRName),
|
SecretName: userConfigurationSecretName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// base
|
// base
|
||||||
createUserConfigurationSecret(t, jenkinsCRName, namespace, systemMessageEnvName, systemMessage)
|
createUserConfigurationSecret(t, namespace, systemMessageEnvName, systemMessage)
|
||||||
createUserConfigurationConfigMap(t, jenkinsCRName, namespace, numberOfExecutors, fmt.Sprintf("${%s}", systemMessageEnvName))
|
createUserConfigurationConfigMap(t, namespace, numberOfExecutors, fmt.Sprintf("${%s}", systemMessageEnvName))
|
||||||
jenkins := createJenkinsCR(t, jenkinsCRName, namespace, &[]v1alpha2.SeedJob{mySeedJob.SeedJob}, volumes)
|
jenkins := createJenkinsCR(t, jenkinsCRName, namespace, &[]v1alpha2.SeedJob{mySeedJob.SeedJob}, volumes)
|
||||||
createDefaultLimitsForContainersInNamespace(t, namespace)
|
createDefaultLimitsForContainersInNamespace(t, namespace)
|
||||||
createKubernetesCredentialsProviderSecret(t, namespace, mySeedJob)
|
createKubernetesCredentialsProviderSecret(t, namespace, mySeedJob)
|
||||||
|
|
@ -79,10 +79,10 @@ func TestConfiguration(t *testing.T) {
|
||||||
verifyJenkinsSeedJobs(t, client, []seedJobConfig{mySeedJob})
|
verifyJenkinsSeedJobs(t, client, []seedJobConfig{mySeedJob})
|
||||||
}
|
}
|
||||||
|
|
||||||
func createUserConfigurationSecret(t *testing.T, jenkinsCRName string, namespace string, systemMessageEnvName, systemMessage string) {
|
func createUserConfigurationSecret(t *testing.T, namespace string, systemMessageEnvName, systemMessage string) {
|
||||||
userConfiguration := &corev1.Secret{
|
userConfiguration := &corev1.Secret{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: resources.GetUserConfigurationSecretName(jenkinsCRName),
|
Name: userConfigurationSecretName,
|
||||||
Namespace: namespace,
|
Namespace: namespace,
|
||||||
},
|
},
|
||||||
StringData: map[string]string{
|
StringData: map[string]string{
|
||||||
|
|
@ -96,10 +96,10 @@ func createUserConfigurationSecret(t *testing.T, jenkinsCRName string, namespace
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func createUserConfigurationConfigMap(t *testing.T, jenkinsCRName string, namespace string, numberOfExecutors int, systemMessage string) {
|
func createUserConfigurationConfigMap(t *testing.T, namespace string, numberOfExecutors int, systemMessage string) {
|
||||||
userConfiguration := &corev1.ConfigMap{
|
userConfiguration := &corev1.ConfigMap{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: resources.GetUserConfigurationConfigMapName(jenkinsCRName),
|
Name: userConfigurationConfigMapName,
|
||||||
Namespace: namespace,
|
Namespace: namespace,
|
||||||
},
|
},
|
||||||
Data: map[string]string{
|
Data: map[string]string{
|
||||||
|
|
|
||||||
|
|
@ -17,6 +17,11 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
userConfigurationConfigMapName = "user-config"
|
||||||
|
userConfigurationSecretName = "user-secret"
|
||||||
|
)
|
||||||
|
|
||||||
func getJenkins(t *testing.T, namespace, name string) *v1alpha2.Jenkins {
|
func getJenkins(t *testing.T, namespace, name string) *v1alpha2.Jenkins {
|
||||||
jenkins := &v1alpha2.Jenkins{}
|
jenkins := &v1alpha2.Jenkins{}
|
||||||
namespaceName := types.NamespacedName{Namespace: namespace, Name: name}
|
namespaceName := types.NamespacedName{Namespace: namespace, Name: name}
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,6 @@ import (
|
||||||
|
|
||||||
"github.com/jenkinsci/kubernetes-operator/pkg/apis/jenkins/v1alpha2"
|
"github.com/jenkinsci/kubernetes-operator/pkg/apis/jenkins/v1alpha2"
|
||||||
jenkinsclient "github.com/jenkinsci/kubernetes-operator/pkg/controller/jenkins/client"
|
jenkinsclient "github.com/jenkinsci/kubernetes-operator/pkg/controller/jenkins/client"
|
||||||
"github.com/jenkinsci/kubernetes-operator/pkg/controller/jenkins/configuration/base/resources"
|
|
||||||
|
|
||||||
framework "github.com/operator-framework/operator-sdk/pkg/test"
|
framework "github.com/operator-framework/operator-sdk/pkg/test"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
@ -36,7 +35,7 @@ func TestSafeRestart(t *testing.T) {
|
||||||
defer ctx.Cleanup()
|
defer ctx.Cleanup()
|
||||||
|
|
||||||
jenkinsCRName := "e2e"
|
jenkinsCRName := "e2e"
|
||||||
configureAuthorizationToUnSecure(t, jenkinsCRName, namespace)
|
configureAuthorizationToUnSecure(t, namespace)
|
||||||
jenkins := createJenkinsCR(t, jenkinsCRName, namespace, nil, []corev1.Volume{})
|
jenkins := createJenkinsCR(t, jenkinsCRName, namespace, nil, []corev1.Volume{})
|
||||||
waitForJenkinsBaseConfigurationToComplete(t, jenkins)
|
waitForJenkinsBaseConfigurationToComplete(t, jenkins)
|
||||||
waitForJenkinsUserConfigurationToComplete(t, jenkins)
|
waitForJenkinsUserConfigurationToComplete(t, jenkins)
|
||||||
|
|
@ -50,10 +49,10 @@ func TestSafeRestart(t *testing.T) {
|
||||||
checkIfAuthorizationStrategyUnsecuredIsSet(t, jenkinsClient)
|
checkIfAuthorizationStrategyUnsecuredIsSet(t, jenkinsClient)
|
||||||
}
|
}
|
||||||
|
|
||||||
func configureAuthorizationToUnSecure(t *testing.T, jenkinsCRName, namespace string) {
|
func configureAuthorizationToUnSecure(t *testing.T, namespace string) {
|
||||||
limitRange := &corev1.ConfigMap{
|
limitRange := &corev1.ConfigMap{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: resources.GetUserConfigurationConfigMapName(jenkinsCRName),
|
Name: userConfigurationConfigMapName,
|
||||||
Namespace: namespace,
|
Namespace: namespace,
|
||||||
},
|
},
|
||||||
Data: map[string]string{
|
Data: map[string]string{
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue