Migrate Helm Chart to OSDK v1.3.0 (#551)
Migrate Helm Chart to OSDK v1.3.0
This commit is contained in:
parent
223119b62d
commit
c74606a2ee
|
|
@ -46,7 +46,10 @@ jobs:
|
|||
make minikube-start MINIKUBE_DRIVER='docker' CPUS_NUMBER=2
|
||||
|
||||
- name: Jenkins Operator - e2e
|
||||
run: |
|
||||
make e2e E2E_TEST_ARGS='-ginkgo.v'
|
||||
run: make e2e E2E_TEST_ARGS='-ginkgo.v'
|
||||
|
||||
#TODO Helm e2e test
|
||||
- name: Jenkins Operator - Helm Chart tests
|
||||
run: |
|
||||
make helm-lint
|
||||
eval $(bin/minikube docker-env)
|
||||
make helm-e2e E2E_TEST_ARGS='-ginkgo.v'
|
||||
|
|
|
|||
48
Makefile
48
Makefile
|
|
@ -89,11 +89,17 @@ test: ## Runs the go tests
|
|||
@RUNNING_TESTS=1 go test -tags "$(BUILDTAGS) cgo" $(PACKAGES_FOR_UNIT_TESTS)
|
||||
|
||||
.PHONY: e2e
|
||||
e2e: deepcopy-gen ## Runs e2e tests, you can use EXTRA_ARGS
|
||||
e2e: deepcopy-gen manifests ## Runs e2e tests, you can use EXTRA_ARGS
|
||||
@echo "+ $@"
|
||||
RUNNING_TESTS=1 go test -parallel=1 "./test/e2e/" -tags "$(BUILDTAGS) cgo" -v -timeout 60m -run "$(E2E_TEST_SELECTOR)" \
|
||||
RUNNING_TESTS=1 go test -parallel=1 "./test/e2e/" -ginkgo.v -tags "$(BUILDTAGS) cgo" -v -timeout 60m -run "$(E2E_TEST_SELECTOR)" \
|
||||
-jenkins-api-hostname=$(JENKINS_API_HOSTNAME) -jenkins-api-port=$(JENKINS_API_PORT) -jenkins-api-use-nodeport=$(JENKINS_API_USE_NODEPORT) $(E2E_TEST_ARGS)
|
||||
|
||||
.PHONY: helm-e2e
|
||||
IMAGE_NAME := $(DOCKER_REGISTRY):$(GITCOMMIT)
|
||||
helm-e2e: helm container-runtime-build ## Runs helm e2e tests, you can use EXTRA_ARGS
|
||||
@echo "+ $@"
|
||||
RUNNING_TESTS=1 go test -parallel=1 "./test/helm/" -ginkgo.v -tags "$(BUILDTAGS) cgo" -v -timeout 60m -run "$(E2E_TEST_SELECTOR)" -image-name=$(IMAGE_NAME) $(E2E_TEST_ARGS)
|
||||
|
||||
.PHONY: vet
|
||||
vet: ## Verifies `go vet` passes
|
||||
@echo "+ $@"
|
||||
|
|
@ -136,7 +142,7 @@ install: ## Installs the executable
|
|||
.PHONY: run
|
||||
run: export WATCH_NAMESPACE = $(NAMESPACE)
|
||||
run: export OPERATOR_NAME = $(NAME)
|
||||
run: fmt vet manifests install-crds build ## Run the executable, you can use EXTRA_ARGS
|
||||
run: fmt vet install-crds build ## Run the executable, you can use EXTRA_ARGS
|
||||
@echo "+ $@"
|
||||
ifeq ($(KUBERNETES_PROVIDER),minikube)
|
||||
kubectl config use-context $(KUBECTL_CONTEXT)
|
||||
|
|
@ -301,6 +307,18 @@ ifneq ($(KUBERNETES_PROVIDER),crc)
|
|||
$(error KUBERNETES_PROVIDER not set to 'crc')
|
||||
endif
|
||||
|
||||
.PHONY: helm
|
||||
HAS_HELM := $(shell which $(PROJECT_DIR)/bin/helm)
|
||||
helm: ## Download helm if it's not present
|
||||
@echo "+ $@"
|
||||
ifndef HAS_HELM
|
||||
mkdir -p $(PROJECT_DIR)/bin
|
||||
curl -Lo bin/helm.tar.gz https://get.helm.sh/helm-v$(HELM_VERSION)-$(PLATFORM)-amd64.tar.gz && tar xzfv bin/helm.tar.gz -C $(PROJECT_DIR)/bin
|
||||
mv $(PROJECT_DIR)/bin/$(PLATFORM)-amd64/helm $(PROJECT_DIR)/bin/helm
|
||||
rm -rf $(PROJECT_DIR)/bin/$(PLATFORM)-amd64
|
||||
rm -rf $(PROJECT_DIR)/bin/helm.tar.gz
|
||||
endif
|
||||
|
||||
.PHONY: minikube
|
||||
HAS_MINIKUBE := $(shell which $(PROJECT_DIR)/bin/minikube)
|
||||
minikube: ## Download minikube if it's not present
|
||||
|
|
@ -342,11 +360,13 @@ bump-version: sembump ## Bump the version in the version file. Set BUMP to [ pat
|
|||
sed -i s/$(VERSION)/$(NEW_VERSION)/g README.md
|
||||
sed -i s/$(VERSION)/$(NEW_VERSION)/g deploy/operator.yaml
|
||||
sed -i s/$(VERSION)/$(NEW_VERSION)/g deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cp deploy/service_account.yaml deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cat deploy/role.yaml >> deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cat deploy/role_binding.yaml >> deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cat deploy/operator.yaml >> deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
git add VERSION.txt README.md deploy/operator.yaml deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cp config/service_account.yaml deploy/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cat config/rbac/leader_election_role.yaml >> config/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cat config/rbac/leader_election_role_binding.yaml >> config/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)=$(API_VERSION).yaml
|
||||
cat config/rbac/role.yaml >> config/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)=$(API_VERSION).yaml
|
||||
cat config/rbac/role_binding.yaml >> config/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
cat config/manager/manager.yaml >> config/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
git add VERSION.txt README.md config/manager/manager.yaml config/$(ALL_IN_ONE_DEPLOY_FILE_PREFIX)-$(API_VERSION).yaml
|
||||
git commit -vaem "Bump version to $(NEW_VERSION)"
|
||||
@echo "Run make tag to create and push the tag for new version $(NEW_VERSION)"
|
||||
|
||||
|
|
@ -379,19 +399,24 @@ endif
|
|||
go mod vendor -v
|
||||
@echo
|
||||
|
||||
.PHONY: helm-lint
|
||||
helm-lint: helm
|
||||
@echo "+ $@"
|
||||
bin/helm lint chart/jenkins-operator
|
||||
|
||||
.PHONY: helm-package
|
||||
helm-package:
|
||||
helm-package: helm
|
||||
@echo "+ $@"
|
||||
mkdir -p /tmp/jenkins-operator-charts
|
||||
mv chart/jenkins-operator/*.tgz /tmp/jenkins-operator-charts
|
||||
cd chart && helm package jenkins-operator
|
||||
cd chart && bin/helm package jenkins-operator
|
||||
mv /tmp/jenkins-operator-charts/*.tgz chart/jenkins-operator/
|
||||
rm -rf /tmp/jenkins-operator-charts/
|
||||
|
||||
.PHONY: helm-deploy
|
||||
helm-deploy: helm-package
|
||||
@echo "+ $@"
|
||||
helm repo index chart/ --url https://raw.githubusercontent.com/jenkinsci/kubernetes-operator/master/chart/jenkins-operator/
|
||||
bin/helm repo index chart/ --url https://raw.githubusercontent.com/jenkinsci/kubernetes-operator/master/chart/jenkins-operator/
|
||||
cd chart/ && mv jenkins-operator-*.tgz jenkins-operator
|
||||
|
||||
# Download and build hugo extended locally if necessary
|
||||
|
|
@ -418,6 +443,7 @@ FILENAME := config/all_in_one_$(API_VERSION).yaml
|
|||
all-in-one-build: ## Re-generate all-in-one yaml
|
||||
@echo "+ $@"
|
||||
> $(FILENAME)
|
||||
cat config/service_account.yaml >> $(FILENAME)
|
||||
cat config/rbac/leader_election_role.yaml >> $(FILENAME)
|
||||
cat config/rbac/leader_election_role_binding.yaml >> $(FILENAME)
|
||||
cat config/rbac/role.yaml >> $(FILENAME)
|
||||
|
|
|
|||
File diff suppressed because it is too large
Load Diff
|
|
@ -1,19 +0,0 @@
|
|||
apiVersion: apiextensions.k8s.io/v1beta1
|
||||
kind: CustomResourceDefinition
|
||||
metadata:
|
||||
name: jenkinsimages.jenkins.io
|
||||
spec:
|
||||
group: jenkins.io
|
||||
names:
|
||||
kind: JenkinsImage
|
||||
listKind: JenkinsImageList
|
||||
plural: jenkinsimages
|
||||
singular: jenkinsimage
|
||||
scope: Namespaced
|
||||
versions:
|
||||
- name : v1alpha2
|
||||
served: true
|
||||
storage: true
|
||||
- name : v1alpha1
|
||||
served: true
|
||||
storage: false
|
||||
|
|
@ -7,54 +7,80 @@ metadata:
|
|||
name: jenkins-operator
|
||||
namespace: {{ $namespace }}
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- services
|
||||
- configmaps
|
||||
- secrets
|
||||
verbs:
|
||||
- get
|
||||
- create
|
||||
- update
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apps
|
||||
resources:
|
||||
- deployments
|
||||
- daemonsets
|
||||
- deployments
|
||||
- replicasets
|
||||
- statefulsets
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- ""
|
||||
- apps
|
||||
- jenkins-operator
|
||||
resources:
|
||||
- serviceaccounts
|
||||
- deployments/finalizers
|
||||
verbs:
|
||||
- get
|
||||
- create
|
||||
- update
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- rbac.authorization.k8s.io
|
||||
- build.openshift.io
|
||||
resources:
|
||||
- roles
|
||||
- rolebindings
|
||||
- buildconfigs
|
||||
- builds
|
||||
verbs:
|
||||
- get
|
||||
- create
|
||||
- update
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/portforward
|
||||
- configmaps
|
||||
- secrets
|
||||
- services
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- persistentvolumeclaims
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- pods/exec
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
|
|
@ -66,28 +92,41 @@ rules:
|
|||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- pods/exec
|
||||
- pods/portforward
|
||||
verbs:
|
||||
- "*"
|
||||
- create
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
- serviceaccounts
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- image.openshift.io
|
||||
resources:
|
||||
- imagestreams
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
- create
|
||||
- patch
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apps
|
||||
resourceNames:
|
||||
- jenkins-operator
|
||||
- jenkins.io
|
||||
resources:
|
||||
- deployments/finalizers
|
||||
- jenkins/finalizers
|
||||
verbs:
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
- jenkins/status
|
||||
verbs:
|
||||
- get
|
||||
- patch
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
|
|
@ -95,23 +134,26 @@ rules:
|
|||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- ""
|
||||
- rbac.authorization.k8s.io
|
||||
resources:
|
||||
- persistentvolumeclaims
|
||||
- rolebindings
|
||||
- roles
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "route.openshift.io"
|
||||
resources:
|
||||
- routes
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- create
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "image.openshift.io"
|
||||
resources:
|
||||
|
|
|
|||
|
|
@ -9,31 +9,41 @@ metadata:
|
|||
{{- end }}
|
||||
spec:
|
||||
configurationAsCode:
|
||||
{{- if .Values.jenkins.configuration.configurationAsCode }}
|
||||
configurations:
|
||||
{{- range .Values.jenkins.configuration.configurationAsCode }}
|
||||
{{ range .Values.jenkins.configuration.configurationAsCode }}
|
||||
- name: {{ .configMapName }}
|
||||
{{- end }}
|
||||
{{- if .Values.jenkins.configuration.configurationAsCode }}
|
||||
secret:
|
||||
{{- if .Values.jenkins.configuration.secretRefName }}
|
||||
name: {{ .Values.jenkins.configuration.secretRefName }}
|
||||
{{- else if .Values.jenkins.configuration.secretData }}
|
||||
name: jenkins-{{ .Values.jenkins.name }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
configurations: []
|
||||
secret:
|
||||
name: ""
|
||||
{{- end }}
|
||||
groovyScripts:
|
||||
{{- if .Values.jenkins.configuration.groovyScripts }}
|
||||
configurations:
|
||||
{{- range .Values.jenkins.configuration.groovyScripts }}
|
||||
- name: {{ .configMapName }}
|
||||
{{- end }}
|
||||
{{- if .Values.jenkins.configuration.groovyScripts }}
|
||||
secret:
|
||||
{{- if .Values.jenkins.configuration.secretRefName }}
|
||||
name: {{ .Values.jenkins.configuration.secretRefName }}
|
||||
{{- else if .Values.jenkins.configuration.secretData }}
|
||||
name: jenkins-{{ .Values.jenkins.name }}
|
||||
{{- end }}
|
||||
{{- else }}
|
||||
configurations: []
|
||||
secret:
|
||||
name: ""
|
||||
{{- end }}
|
||||
jenkinsAPISettings:
|
||||
authorizationStrategy: {{ .Values.jenkins.authorizationStrategy }}
|
||||
{{- if .Values.jenkins.backup.enabled }}
|
||||
backup:
|
||||
containerName: {{ .Values.jenkins.backup.containerName }}
|
||||
|
|
@ -84,7 +94,11 @@ spec:
|
|||
{{- with .Values.jenkins.plugins }}
|
||||
plugins: {{ toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
priorityClassName: {{ .Values.jenkins.priorityClassName }}
|
||||
{{- if .Values.jenkins.priorityClassName }}
|
||||
priorityClassName: {{- .Values.jenkins.priorityClassName }}
|
||||
{{- else }}
|
||||
priorityClassName: ""
|
||||
{{- end }}
|
||||
disableCSRFProtection: {{ .Values.jenkins.disableCSRFProtection }}
|
||||
containers:
|
||||
- name: jenkins-master
|
||||
|
|
@ -112,6 +126,9 @@ spec:
|
|||
- name: {{ .Values.jenkins.backup.containerName }}
|
||||
image: {{ .Values.jenkins.backup.image }}
|
||||
imagePullPolicy: IfNotPresent
|
||||
{{- with .Values.jenkins.backup.resources }}
|
||||
resources: {{ toYaml . | nindent 10 }}
|
||||
{{- end }}
|
||||
{{- with .Values.jenkins.backup.env }}
|
||||
env: {{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
|
|
|
|||
|
|
@ -0,0 +1,28 @@
|
|||
---
|
||||
# permissions to do leader election.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: leader-election-role
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
- coordination.k8s.io
|
||||
resources:
|
||||
- configmaps
|
||||
- leases
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- create
|
||||
- update
|
||||
- patch
|
||||
- delete
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- create
|
||||
- patch
|
||||
|
|
@ -0,0 +1,12 @@
|
|||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: leader-election-rolebinding
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: leader-election-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: jenkins-operator
|
||||
|
|
@ -30,7 +30,7 @@ spec:
|
|||
containerPort: 80
|
||||
protocol: TCP
|
||||
command:
|
||||
- jenkins-operator
|
||||
- /manager
|
||||
args: []
|
||||
env:
|
||||
- name: WATCH_NAMESPACE
|
||||
|
|
|
|||
|
|
@ -63,7 +63,7 @@ jenkins:
|
|||
#
|
||||
# basePlugins:
|
||||
# - name: kubernetes
|
||||
# version: 1.28.6
|
||||
# version: 1.29.2
|
||||
# - name: workflow-job
|
||||
# version: "2.40"
|
||||
# - name: workflow-aggregator
|
||||
|
|
@ -136,6 +136,9 @@ jenkins:
|
|||
# volumeMounts are mounts for Jenkins pod
|
||||
volumeMounts: []
|
||||
|
||||
# defines authorization strategy of the operator for the Jenkins API
|
||||
authorizationStrategy: createUser
|
||||
|
||||
# securityContext for pod
|
||||
securityContext:
|
||||
runAsUser: 1000
|
||||
|
|
@ -216,6 +219,15 @@ jenkins:
|
|||
# See https://kubernetes.io/docs/concepts/storage/persistent-volumes/#class-1 for more details
|
||||
className: ""
|
||||
|
||||
# resources used by backup container
|
||||
resources:
|
||||
limits:
|
||||
cpu: 1500m
|
||||
memory: 1Gi
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 256Mi
|
||||
|
||||
# env contains container environment variables
|
||||
# PVC backup provider handles these variables:
|
||||
# BACKUP_DIR - path for storing backup files (default: "/backup")
|
||||
|
|
|
|||
|
|
@ -1,4 +1,9 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: jenkins-operator
|
||||
---
|
||||
# permissions to do leader election.
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
|
|
@ -37,53 +42,89 @@ roleRef:
|
|||
name: leader-election-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: default
|
||||
namespace: default
|
||||
name: jenkins-operator
|
||||
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
kind: Role
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: manager-role
|
||||
name: jenkins-operator
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- services
|
||||
- configmaps
|
||||
- secrets
|
||||
- serviceaccounts
|
||||
verbs:
|
||||
- get
|
||||
- create
|
||||
- update
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apps
|
||||
resources:
|
||||
- deployments
|
||||
- daemonsets
|
||||
- deployments
|
||||
- replicasets
|
||||
- statefulsets
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- rbac.authorization.k8s.io
|
||||
- apps
|
||||
- jenkins-operator
|
||||
resources:
|
||||
- roles
|
||||
- rolebindings
|
||||
- deployments/finalizers
|
||||
verbs:
|
||||
- create
|
||||
- update
|
||||
- apiGroups:
|
||||
- build.openshift.io
|
||||
resources:
|
||||
- buildconfigs
|
||||
- builds
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/portforward
|
||||
- configmaps
|
||||
- secrets
|
||||
- services
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- persistentvolumeclaims
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- pods/exec
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
|
|
@ -95,28 +136,41 @@ rules:
|
|||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- pods/exec
|
||||
- pods/portforward
|
||||
verbs:
|
||||
- "*"
|
||||
- create
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
- serviceaccounts
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- image.openshift.io
|
||||
resources:
|
||||
- imagestreams
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
- create
|
||||
- patch
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apps
|
||||
resourceNames:
|
||||
- jenkins-operator
|
||||
- jenkins.io
|
||||
resources:
|
||||
- deployments/finalizers
|
||||
- jenkins/finalizers
|
||||
verbs:
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
- jenkins/status
|
||||
verbs:
|
||||
- get
|
||||
- patch
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
|
|
@ -124,23 +178,26 @@ rules:
|
|||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- ""
|
||||
- rbac.authorization.k8s.io
|
||||
resources:
|
||||
- persistentvolumeclaims
|
||||
- rolebindings
|
||||
- roles
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "route.openshift.io"
|
||||
resources:
|
||||
- routes
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- create
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "image.openshift.io"
|
||||
resources:
|
||||
|
|
@ -160,23 +217,21 @@ rules:
|
|||
- watch
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: manager-rolebinding
|
||||
name: jenkins-operator
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: manager-role
|
||||
kind: Role
|
||||
name: jenkins-operator
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: default
|
||||
namespace: default
|
||||
name: jenkins-operator
|
||||
---
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: jenkins-operator
|
||||
namespace: default
|
||||
labels:
|
||||
control-plane: controller-manager
|
||||
spec:
|
||||
|
|
@ -189,6 +244,7 @@ spec:
|
|||
labels:
|
||||
control-plane: controller-manager
|
||||
spec:
|
||||
serviceAccountName: jenkins-operator
|
||||
securityContext:
|
||||
runAsUser: 65532
|
||||
containers:
|
||||
|
|
|
|||
|
|
@ -16,6 +16,7 @@ spec:
|
|||
labels:
|
||||
control-plane: controller-manager
|
||||
spec:
|
||||
serviceAccountName: jenkins-operator
|
||||
securityContext:
|
||||
runAsUser: 65532
|
||||
containers:
|
||||
|
|
|
|||
|
|
@ -1,88 +1,59 @@
|
|||
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
kind: Role
|
||||
metadata:
|
||||
creationTimestamp: null
|
||||
name: manager-role
|
||||
name: jenkins-operator
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- services
|
||||
- configmaps
|
||||
- secrets
|
||||
- serviceaccounts
|
||||
verbs:
|
||||
- get
|
||||
- create
|
||||
- update
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apiGroups:
|
||||
- apps
|
||||
resources:
|
||||
- deployments
|
||||
- daemonsets
|
||||
- deployments
|
||||
- replicasets
|
||||
- statefulsets
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- rbac.authorization.k8s.io
|
||||
resources:
|
||||
- roles
|
||||
- rolebindings
|
||||
verbs:
|
||||
- create
|
||||
- update
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/portforward
|
||||
verbs:
|
||||
- create
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/log
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- pods/exec
|
||||
verbs:
|
||||
- "*"
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- get
|
||||
- watch
|
||||
- list
|
||||
- create
|
||||
- patch
|
||||
- apiGroups:
|
||||
- apiGroups:
|
||||
- apps
|
||||
resourceNames:
|
||||
- jenkins-operator
|
||||
resources:
|
||||
- deployments/finalizers
|
||||
verbs:
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
- apiGroups:
|
||||
- build.openshift.io
|
||||
resources:
|
||||
- '*'
|
||||
- buildconfigs
|
||||
- builds
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- configmaps
|
||||
- secrets
|
||||
- services
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- events
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- persistentvolumeclaims
|
||||
|
|
@ -90,17 +61,99 @@ rules:
|
|||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "route.openshift.io"
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- routes
|
||||
- pods
|
||||
verbs:
|
||||
- create
|
||||
- delete
|
||||
- get
|
||||
- list
|
||||
- patch
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods
|
||||
- pods/exec
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/log
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- pods/portforward
|
||||
verbs:
|
||||
- create
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- serviceaccounts
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- apiGroups:
|
||||
- watch
|
||||
- apiGroups:
|
||||
- image.openshift.io
|
||||
resources:
|
||||
- imagestreams
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
- jenkins/finalizers
|
||||
verbs:
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
- jenkins/status
|
||||
verbs:
|
||||
- get
|
||||
- patch
|
||||
- update
|
||||
- apiGroups:
|
||||
- jenkins.io
|
||||
resources:
|
||||
- '*'
|
||||
verbs:
|
||||
- '*'
|
||||
- apiGroups:
|
||||
- rbac.authorization.k8s.io
|
||||
resources:
|
||||
- rolebindings
|
||||
- roles
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "route.openshift.io"
|
||||
resources:
|
||||
- routes
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- update
|
||||
- watch
|
||||
- apiGroups:
|
||||
- "image.openshift.io"
|
||||
resources:
|
||||
- imagestreams
|
||||
|
|
@ -108,7 +161,7 @@ rules:
|
|||
- get
|
||||
- list
|
||||
- watch
|
||||
- apiGroups:
|
||||
- apiGroups:
|
||||
- "build.openshift.io"
|
||||
resources:
|
||||
- builds
|
||||
|
|
|
|||
|
|
@ -1,13 +1,12 @@
|
|||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: manager-rolebinding
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: manager-role
|
||||
kind: Role
|
||||
name: jenkins-operator
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: default
|
||||
namespace: default
|
||||
name: jenkins-operator
|
||||
|
|
|
|||
|
|
@ -0,0 +1,6 @@
|
|||
---
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: jenkins-operator
|
||||
namespace: default
|
||||
|
|
@ -111,8 +111,20 @@ func (r *JenkinsReconciler) newJenkinsReconcilier(jenkins *v1alpha2.Jenkins) con
|
|||
// +kubebuilder:rbac:groups=jenkins.io,resources=jenkins/status,verbs=get;update;patch
|
||||
// +kubebuilder:rbac:groups=jenkins.io,resources=jenkins/finalizers,verbs=update
|
||||
// +kubebuilder:rbac:groups=core,resources=pods,verbs=get;list;watch;create;update;patch;delete
|
||||
// +kubebuilder:rbac:groups=core,resources=configmaps,verbs=get;list;watch
|
||||
// +kubebuilder:rbac:groups=v1,resources=secrets,verbs=get;list;watch
|
||||
// +kubebuilder:rbac:groups=core,resources=services;configmaps;secrets,verbs=get;list;watch;create;update
|
||||
// +kubebuilder:rbac:groups=apps,resources=deployments;daemonsets;replicasets;statefulsets,verbs=*
|
||||
// +kubebuilder:rbac:groups=core,resources=serviceaccounts,verbs=get;list;watch;create;update
|
||||
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=roles;rolebindings,verbs=get;list;watch;create;update
|
||||
// +kubebuilder:rbac:groups=core,resources=pods/portforward,verbs=create
|
||||
// +kubebuilder:rbac:groups=core,resources=pods/log,verbs=get;list;watch
|
||||
// +kubebuilder:rbac:groups=core,resources=pods;pods/exec,verbs=*
|
||||
// +kubebuilder:rbac:groups=core,resources=events,verbs=get;watch;list;create;patch
|
||||
// +kubebuilder:rbac:groups=apps;jenkins-operator,resources=deployments/finalizers,verbs=update
|
||||
// +kubebuilder:rbac:groups=jenkins.io,resources=*,verbs=*
|
||||
// +kubebuilder:rbac:groups=core,resources=persistentvolumeclaims,verbs=get;list;watch
|
||||
// +kubebuilder:rbac:groups=route.openshift.io,resources=routes,verbs=get;list;watch;create;update
|
||||
// +kubebuilder:rbac:groups=image.openshift.io,resources=imagestreams,verbs=get;list;watch
|
||||
// +kubebuilder:rbac:groups=build.openshift.io,resources=builds;buildconfigs,verbs=get;list;watch
|
||||
|
||||
// For more details, check Reconcile and its Result here:
|
||||
// - https://pkg.go.dev/sigs.k8s.io/controller-runtime@v0.7.0/pkg/reconcile
|
||||
|
|
|
|||
1
main.go
1
main.go
|
|
@ -122,6 +122,7 @@ func main() {
|
|||
HealthProbeBindAddress: probeAddr,
|
||||
LeaderElection: enableLeaderElection,
|
||||
LeaderElectionID: "c674355f.jenkins.io",
|
||||
Namespace: namespace,
|
||||
})
|
||||
if err != nil {
|
||||
fatal(errors.Wrap(err, "unable to start manager"), *debug)
|
||||
|
|
|
|||
|
|
@ -35,7 +35,7 @@ func createUserConfigurationSecret(namespace string, stringData map[string]strin
|
|||
}
|
||||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "User configuration secret %+v\n", *userConfiguration)
|
||||
Expect(k8sClient.Create(context.TODO(), userConfiguration)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), userConfiguration)).Should(Succeed())
|
||||
}
|
||||
|
||||
func createUserConfigurationConfigMap(namespace string, numberOfExecutorsSecretKeyName string, systemMessage string) {
|
||||
|
|
@ -63,7 +63,7 @@ unclassified:
|
|||
}
|
||||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "User configuration %+v\n", *userConfiguration)
|
||||
Expect(k8sClient.Create(context.TODO(), userConfiguration)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), userConfiguration)).Should(Succeed())
|
||||
}
|
||||
|
||||
func createDefaultLimitsForContainersInNamespace(namespace string) {
|
||||
|
|
@ -92,7 +92,7 @@ func createDefaultLimitsForContainersInNamespace(namespace string) {
|
|||
}
|
||||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "LimitRange %+v\n", *limitRange)
|
||||
Expect(k8sClient.Create(context.TODO(), limitRange)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), limitRange)).Should(Succeed())
|
||||
}
|
||||
|
||||
func verifyJenkinsMasterPodAttributes(jenkins *v1alpha2.Jenkins) {
|
||||
|
|
|
|||
|
|
@ -1,71 +0,0 @@
|
|||
// +build Helm
|
||||
|
||||
package e2e
|
||||
|
||||
// TODO
|
||||
/*
|
||||
import (
|
||||
"fmt"
|
||||
"os/exec"
|
||||
"testing"
|
||||
|
||||
"github.com/jenkinsci/kubernetes-operator/pkg/apis"
|
||||
"github.com/jenkinsci/kubernetes-operator/pkg/apis/jenkins/v1alpha2"
|
||||
|
||||
framework "github.com/operator-framework/operator-sdk/pkg/test"
|
||||
"github.com/stretchr/testify/require"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
)
|
||||
|
||||
func TestLintHelmChart(t *testing.T) {
|
||||
t.Parallel()
|
||||
|
||||
cmd := exec.Command("helm", "lint", "./chart/jenkins-operator")
|
||||
output, err := cmd.CombinedOutput()
|
||||
require.NoError(t, err, string(output))
|
||||
}
|
||||
|
||||
func TestDeployHelmChart(t *testing.T) {
|
||||
// Given
|
||||
t.Parallel()
|
||||
ctx := framework.NewContext(t)
|
||||
defer ctx.Cleanup()
|
||||
|
||||
namespace, err := ctx.GetNamespace()
|
||||
require.NoError(t, err)
|
||||
|
||||
jenkinsServiceList := &v1alpha2.JenkinsList{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: v1alpha2.Kind,
|
||||
APIVersion: v1alpha2.SchemeGroupVersion.String(),
|
||||
},
|
||||
}
|
||||
err = framework.AddToFrameworkScheme(apis.AddToScheme, jenkinsServiceList)
|
||||
require.NoError(t, err)
|
||||
|
||||
jenkins := &v1alpha2.Jenkins{
|
||||
TypeMeta: v1alpha2.JenkinsTypeMeta(),
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: "jenkins",
|
||||
Namespace: namespace,
|
||||
},
|
||||
}
|
||||
|
||||
cmd := exec.Command("helm", "upgrade", "jenkins", "./chart/jenkins-operator", "--namespace", namespace, "--debug",
|
||||
"--set-string", fmt.Sprintf("jenkins.namespace=%s", namespace), "--install")
|
||||
output, err := cmd.CombinedOutput()
|
||||
require.NoError(t, err, string(output))
|
||||
|
||||
waitForJenkinsBaseConfigurationToComplete(t, jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(t, jenkins)
|
||||
|
||||
cmd = exec.Command("helm", "upgrade", "jenkins", "./chart/jenkins-operator", "--namespace", namespace, "--debug",
|
||||
"--set-string", fmt.Sprintf("jenkins.namespace=%s", namespace), "--install")
|
||||
output, err = cmd.CombinedOutput()
|
||||
require.NoError(t, err, string(output))
|
||||
|
||||
// Then
|
||||
waitForJenkinsBaseConfigurationToComplete(t, jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(t, jenkins)
|
||||
}
|
||||
*/
|
||||
|
|
@ -73,7 +73,7 @@ var _ = Describe("Jenkins controller configuration", func() {
|
|||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = createNamespace()
|
||||
namespace = CreateNamespace()
|
||||
|
||||
createUserConfigurationSecret(namespace.Name, userConfigurationSecretData)
|
||||
createUserConfigurationConfigMap(namespace.Name, numberOfExecutorsEnvName, fmt.Sprintf("${%s}", systemMessageEnvName))
|
||||
|
|
@ -83,18 +83,18 @@ var _ = Describe("Jenkins controller configuration", func() {
|
|||
})
|
||||
|
||||
AfterEach(func() {
|
||||
destroyNamespace(namespace)
|
||||
DestroyNamespace(namespace)
|
||||
})
|
||||
|
||||
Context("when deploying CR to cluster", func() {
|
||||
It("creates Jenkins instance and configures it", func() {
|
||||
waitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
verifyJenkinsMasterPodAttributes(jenkins)
|
||||
verifyServices(jenkins)
|
||||
jenkinsClient, cleanUpFunc := verifyJenkinsAPIConnection(jenkins, namespace.Name)
|
||||
defer cleanUpFunc()
|
||||
verifyPlugins(jenkinsClient, jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
verifyUserConfiguration(jenkinsClient, numberOfExecutors, systemMessage)
|
||||
verifyJenkinsSeedJobs(jenkinsClient, []seedJobConfig{mySeedJob})
|
||||
})
|
||||
|
|
@ -124,17 +124,17 @@ var _ = Describe("Jenkins controller priority class", func() {
|
|||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = createNamespace()
|
||||
namespace = CreateNamespace()
|
||||
jenkins = createJenkinsCR(jenkinsCRName, namespace.Name, nil, groovyScripts, casc, priorityClassName)
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
destroyNamespace(namespace)
|
||||
DestroyNamespace(namespace)
|
||||
})
|
||||
|
||||
Context("when deploying CR with priority class to cluster", func() {
|
||||
It("creates Jenkins instance and configures it", func() {
|
||||
waitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
verifyJenkinsMasterPodAttributes(jenkins)
|
||||
})
|
||||
})
|
||||
|
|
@ -175,17 +175,17 @@ var _ = Describe("Jenkins controller plugins test", func() {
|
|||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = createNamespace()
|
||||
namespace = CreateNamespace()
|
||||
jenkins = createJenkinsCR(jenkinsCRName, namespace.Name, &[]v1alpha2.SeedJob{mySeedJob.SeedJob}, groovyScripts, casc, priorityClassName)
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
destroyNamespace(namespace)
|
||||
DestroyNamespace(namespace)
|
||||
})
|
||||
|
||||
Context("when deploying CR with a SeedJob to cluster", func() {
|
||||
It("runs kubernetes plugin job successfully", func() {
|
||||
waitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
jenkinsClient, cleanUpFunc := verifyJenkinsAPIConnection(jenkins, namespace.Name)
|
||||
defer cleanUpFunc()
|
||||
waitForJobCreation(jenkinsClient, jobID)
|
||||
|
|
|
|||
|
|
@ -32,23 +32,23 @@ var _ = Describe("Jenkins controller", func() {
|
|||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = createNamespace()
|
||||
namespace = CreateNamespace()
|
||||
|
||||
configureAuthorizationToUnSecure(namespace.Name, userConfigurationConfigMapName)
|
||||
jenkins = createJenkinsCR(jenkinsCRName, namespace.Name, nil, groovyScripts, casc, priorityClassName)
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
destroyNamespace(namespace)
|
||||
DestroyNamespace(namespace)
|
||||
})
|
||||
|
||||
Context("when restarting Jenkins master pod", func() {
|
||||
It("new Jenkins Master pod should be created", func() {
|
||||
waitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
restartJenkinsMasterPod(jenkins)
|
||||
waitForRecreateJenkinsMasterPod(jenkins)
|
||||
checkBaseConfigurationCompleteTimeIsNotSet(jenkins)
|
||||
waitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
})
|
||||
})
|
||||
})
|
||||
|
|
@ -80,20 +80,20 @@ var _ = Describe("Jenkins controller", func() {
|
|||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = createNamespace()
|
||||
namespace = CreateNamespace()
|
||||
|
||||
configureAuthorizationToUnSecure(namespace.Name, userConfigurationConfigMapName)
|
||||
jenkins = createJenkinsCRSafeRestart(jenkinsCRName, namespace.Name, nil, groovyScripts, casc, priorityClassName)
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
destroyNamespace(namespace)
|
||||
DestroyNamespace(namespace)
|
||||
})
|
||||
|
||||
Context("when running Jenkins safe restart", func() {
|
||||
It("authorization strategy is not overwritten", func() {
|
||||
waitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
jenkinsClient, cleanUpFunc := verifyJenkinsAPIConnection(jenkins, namespace.Name)
|
||||
defer cleanUpFunc()
|
||||
checkIfAuthorizationStrategyUnsecuredIsSet(jenkinsClient)
|
||||
|
|
|
|||
|
|
@ -21,19 +21,19 @@ var _ = Describe("Jenkins controller backup and restore", func() {
|
|||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = createNamespace()
|
||||
namespace = CreateNamespace()
|
||||
|
||||
createPVC(namespace.Name)
|
||||
jenkins = createJenkinsWithBackupAndRestoreConfigured(jenkinsCRName, namespace.Name)
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
destroyNamespace(namespace)
|
||||
DestroyNamespace(namespace)
|
||||
})
|
||||
|
||||
Context("when deploying CR with backup enabled to cluster", func() {
|
||||
It("performs backups before pod deletion and restores them even Jenkins status is restarted", func() {
|
||||
waitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
jenkinsClient, cleanUpFunc := verifyJenkinsAPIConnection(jenkins, namespace.Name)
|
||||
defer cleanUpFunc()
|
||||
waitForJobCreation(jenkinsClient, jobID)
|
||||
|
|
@ -42,7 +42,7 @@ var _ = Describe("Jenkins controller backup and restore", func() {
|
|||
jenkins = getJenkins(jenkins.Namespace, jenkins.Name)
|
||||
restartJenkinsMasterPod(jenkins)
|
||||
waitForRecreateJenkinsMasterPod(jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
jenkinsClient2, cleanUpFunc2 := verifyJenkinsAPIConnection(jenkins, namespace.Name)
|
||||
defer cleanUpFunc2()
|
||||
waitForJobCreation(jenkinsClient2, jobID)
|
||||
|
|
@ -51,7 +51,7 @@ var _ = Describe("Jenkins controller backup and restore", func() {
|
|||
resetJenkinsStatus(jenkins)
|
||||
jenkins = getJenkins(jenkins.Namespace, jenkins.Name)
|
||||
checkBaseConfigurationCompleteTimeIsNotSet(jenkins)
|
||||
waitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
jenkinsClient3, cleanUpFunc3 := verifyJenkinsAPIConnection(jenkins, namespace.Name)
|
||||
defer cleanUpFunc3()
|
||||
waitForJobCreation(jenkinsClient3, jobID)
|
||||
|
|
|
|||
|
|
@ -31,7 +31,7 @@ const (
|
|||
func getJenkins(namespace, name string) *v1alpha2.Jenkins {
|
||||
jenkins := &v1alpha2.Jenkins{}
|
||||
namespaceName := types.NamespacedName{Namespace: namespace, Name: name}
|
||||
Expect(k8sClient.Get(context.TODO(), namespaceName, jenkins)).Should(Succeed())
|
||||
Expect(K8sClient.Get(context.TODO(), namespaceName, jenkins)).Should(Succeed())
|
||||
return jenkins
|
||||
}
|
||||
|
||||
|
|
@ -41,7 +41,7 @@ func getJenkinsMasterPod(jenkins *v1alpha2.Jenkins) *corev1.Pod {
|
|||
Namespace: jenkins.Namespace,
|
||||
}
|
||||
pods := &corev1.PodList{}
|
||||
Expect(k8sClient.List(context.TODO(), pods, lo)).Should(Succeed())
|
||||
Expect(K8sClient.List(context.TODO(), pods, lo)).Should(Succeed())
|
||||
Expect(pods.Items).Should(HaveLen(1), fmt.Sprintf("Jenkins pod not found, pod list: %+v", pods.Items))
|
||||
return &pods.Items[0]
|
||||
}
|
||||
|
|
@ -147,7 +147,7 @@ func createJenkinsCR(name, namespace string, seedJob *[]v1alpha2.SeedJob, groovy
|
|||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Jenkins CR %+v\n", *jenkins)
|
||||
|
||||
Expect(k8sClient.Create(context.TODO(), jenkins)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), jenkins)).Should(Succeed())
|
||||
|
||||
return jenkins
|
||||
}
|
||||
|
|
@ -253,7 +253,7 @@ func createJenkinsCRSafeRestart(name, namespace string, seedJob *[]v1alpha2.Seed
|
|||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Jenkins CR %+v\n", *jenkins)
|
||||
|
||||
Expect(k8sClient.Create(context.TODO(), jenkins)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), jenkins)).Should(Succeed())
|
||||
|
||||
return jenkins
|
||||
}
|
||||
|
|
@ -261,11 +261,11 @@ func createJenkinsCRSafeRestart(name, namespace string, seedJob *[]v1alpha2.Seed
|
|||
func createJenkinsAPIClientFromServiceAccount(jenkins *v1alpha2.Jenkins, jenkinsAPIURL string) (jenkinsclient.Jenkins, error) {
|
||||
podName := resources.GetJenkinsMasterPodName(jenkins)
|
||||
|
||||
clientSet, err := kubernetes.NewForConfig(cfg)
|
||||
clientSet, err := kubernetes.NewForConfig(Cfg)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
config := configuration.Configuration{Jenkins: jenkins, ClientSet: *clientSet, Config: cfg}
|
||||
config := configuration.Configuration{Jenkins: jenkins, ClientSet: *clientSet, Config: Cfg}
|
||||
r := base.New(config, jenkinsclient.JenkinsAPIConnectionSettings{})
|
||||
|
||||
token, _, err := r.Configuration.Exec(podName, resources.JenkinsMasterContainerName, []string{"cat", "/var/run/secrets/kubernetes.io/serviceaccount/token"})
|
||||
|
|
@ -281,7 +281,7 @@ func createJenkinsAPIClientFromSecret(jenkins *v1alpha2.Jenkins, jenkinsAPIURL s
|
|||
|
||||
adminSecret := &corev1.Secret{}
|
||||
namespaceName := types.NamespacedName{Namespace: jenkins.Namespace, Name: resources.GetOperatorCredentialsSecretName(jenkins)}
|
||||
if err := k8sClient.Get(context.TODO(), namespaceName, adminSecret); err != nil {
|
||||
if err := K8sClient.Get(context.TODO(), namespaceName, adminSecret); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
|
|
@ -296,7 +296,7 @@ func verifyJenkinsAPIConnection(jenkins *v1alpha2.Jenkins, namespace string) (je
|
|||
By("establishing Jenkins API connection")
|
||||
|
||||
var service corev1.Service
|
||||
err := k8sClient.Get(context.TODO(), types.NamespacedName{
|
||||
err := K8sClient.Get(context.TODO(), types.NamespacedName{
|
||||
Namespace: jenkins.Namespace,
|
||||
Name: resources.GetJenkinsHTTPServiceName(jenkins),
|
||||
}, &service)
|
||||
|
|
@ -333,7 +333,7 @@ func verifyJenkinsAPIConnection(jenkins *v1alpha2.Jenkins, namespace string) (je
|
|||
func restartJenkinsMasterPod(jenkins *v1alpha2.Jenkins) {
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Restarting Jenkins master pod\n")
|
||||
jenkinsPod := getJenkinsMasterPod(jenkins)
|
||||
Expect(k8sClient.Delete(context.TODO(), jenkinsPod)).Should(Succeed())
|
||||
Expect(K8sClient.Delete(context.TODO(), jenkinsPod)).Should(Succeed())
|
||||
|
||||
Eventually(func() (bool, error) {
|
||||
jenkinsPod = getJenkinsMasterPod(jenkins)
|
||||
|
|
@ -346,7 +346,7 @@ func restartJenkinsMasterPod(jenkins *v1alpha2.Jenkins) {
|
|||
func getJenkinsService(jenkins *v1alpha2.Jenkins, serviceKind string) *corev1.Service {
|
||||
service := &corev1.Service{}
|
||||
serviceName := constants.OperatorName + "-" + serviceKind + "-" + jenkins.ObjectMeta.Name
|
||||
Expect(k8sClient.Get(context.TODO(), client.ObjectKey{Name: serviceName, Namespace: jenkins.Namespace}, service)).Should(Succeed())
|
||||
Expect(K8sClient.Get(context.TODO(), client.ObjectKey{Name: serviceName, Namespace: jenkins.Namespace}, service)).Should(Succeed())
|
||||
|
||||
return service
|
||||
}
|
||||
|
|
|
|||
|
|
@ -66,7 +66,7 @@ func setupPortForwardToPod(namespace, podName string, podPort int) (port int, cl
|
|||
readyCh := make(chan struct{})
|
||||
|
||||
req := portForwardToPodRequest{
|
||||
config: cfg,
|
||||
config: Cfg,
|
||||
pod: v1.Pod{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: podName,
|
||||
|
|
|
|||
|
|
@ -33,7 +33,7 @@ jenkins.save()
|
|||
},
|
||||
}
|
||||
|
||||
Expect(k8sClient.Create(context.TODO(), limitRange)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), limitRange)).Should(Succeed())
|
||||
}
|
||||
|
||||
func checkIfAuthorizationStrategyUnsecuredIsSet(jenkinsClient jenkinsclient.Jenkins) {
|
||||
|
|
@ -56,7 +56,7 @@ func checkBaseConfigurationCompleteTimeIsNotSet(jenkins *v1alpha2.Jenkins) {
|
|||
|
||||
Eventually(func() (bool, error) {
|
||||
actualJenkins := &v1alpha2.Jenkins{}
|
||||
err := k8sClient.Get(context.TODO(), types.NamespacedName{Name: jenkins.Name, Namespace: jenkins.Namespace}, actualJenkins)
|
||||
err := K8sClient.Get(context.TODO(), types.NamespacedName{Name: jenkins.Name, Namespace: jenkins.Namespace}, actualJenkins)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
|
|
|||
|
|
@ -61,7 +61,7 @@ func createPVC(namespace string) {
|
|||
},
|
||||
}
|
||||
|
||||
Expect(k8sClient.Create(context.TODO(), pvc)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), pvc)).Should(Succeed())
|
||||
}
|
||||
|
||||
func createJenkinsWithBackupAndRestoreConfigured(name, namespace string) *v1alpha2.Jenkins {
|
||||
|
|
@ -180,7 +180,7 @@ func createJenkinsWithBackupAndRestoreConfigured(name, namespace string) *v1alph
|
|||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Jenkins CR %+v\n", *jenkins)
|
||||
|
||||
Expect(k8sClient.Create(context.TODO(), jenkins)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), jenkins)).Should(Succeed())
|
||||
|
||||
return jenkins
|
||||
}
|
||||
|
|
@ -190,5 +190,5 @@ func resetJenkinsStatus(jenkins *v1alpha2.Jenkins) {
|
|||
|
||||
jenkins = getJenkins(jenkins.Namespace, jenkins.Name)
|
||||
jenkins.Status = v1alpha2.JenkinsStatus{}
|
||||
Expect(k8sClient.Status().Update(context.TODO(), jenkins)).Should(Succeed())
|
||||
Expect(K8sClient.Status().Update(context.TODO(), jenkins)).Should(Succeed())
|
||||
}
|
||||
|
|
|
|||
|
|
@ -104,7 +104,7 @@ func createKubernetesCredentialsProviderSecret(namespace string, config seedJobC
|
|||
},
|
||||
}
|
||||
|
||||
Expect(k8sClient.Create(context.TODO(), secret)).Should(Succeed())
|
||||
Expect(K8sClient.Create(context.TODO(), secret)).Should(Succeed())
|
||||
}
|
||||
|
||||
func verifyJenkinsSeedJobs(jenkinsClient jenkinsclient.Jenkins, seedJobs []seedJobConfig) {
|
||||
|
|
|
|||
|
|
@ -1,12 +1,9 @@
|
|||
package e2e
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
"fmt"
|
||||
"path/filepath"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/jenkinsci/kubernetes-operator/api/v1alpha2"
|
||||
"github.com/jenkinsci/kubernetes-operator/controllers"
|
||||
|
|
@ -18,13 +15,9 @@ import (
|
|||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
"k8s.io/client-go/kubernetes/scheme"
|
||||
"k8s.io/client-go/rest"
|
||||
ctrl "sigs.k8s.io/controller-runtime"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
"sigs.k8s.io/controller-runtime/pkg/envtest"
|
||||
"sigs.k8s.io/controller-runtime/pkg/envtest/printer"
|
||||
logf "sigs.k8s.io/controller-runtime/pkg/log"
|
||||
|
|
@ -32,16 +25,6 @@ import (
|
|||
// +kubebuilder:scaffold:imports
|
||||
)
|
||||
|
||||
var (
|
||||
cfg *rest.Config
|
||||
k8sClient client.Client
|
||||
testEnv *envtest.Environment
|
||||
|
||||
hostname *string
|
||||
port *int
|
||||
useNodePort *bool
|
||||
)
|
||||
|
||||
func init() {
|
||||
hostname = flag.String("jenkins-api-hostname", "", "Hostname or IP of Jenkins API. It can be service name, node IP or localhost.")
|
||||
port = flag.Int("jenkins-api-port", 0, "The port on which Jenkins API is running. Note: If you want to use nodePort don't set this setting and --jenkins-api-use-nodeport must be true.")
|
||||
|
|
@ -68,9 +51,9 @@ var _ = BeforeSuite(func(done Done) {
|
|||
}
|
||||
|
||||
var err error
|
||||
cfg, err = testEnv.Start()
|
||||
Cfg, err = testEnv.Start()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(cfg).NotTo(BeNil())
|
||||
Expect(Cfg).NotTo(BeNil())
|
||||
|
||||
err = v1alpha2.AddToScheme(scheme.Scheme)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
|
@ -78,20 +61,20 @@ var _ = BeforeSuite(func(done Done) {
|
|||
// +kubebuilder:scaffold:scheme
|
||||
|
||||
// setup manager
|
||||
k8sManager, err := ctrl.NewManager(cfg, ctrl.Options{
|
||||
k8sManager, err := ctrl.NewManager(Cfg, ctrl.Options{
|
||||
Scheme: scheme.Scheme,
|
||||
})
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
// setup controller
|
||||
clientSet, err := kubernetes.NewForConfig(cfg)
|
||||
clientSet, err := kubernetes.NewForConfig(Cfg)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
// setup events
|
||||
events, err := event.New(cfg, constants.OperatorName)
|
||||
events, err := event.New(Cfg, constants.OperatorName)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
notificationEvents := make(chan e.Event)
|
||||
go notifications.Listen(notificationEvents, events, k8sClient)
|
||||
go notifications.Listen(notificationEvents, events, K8sClient)
|
||||
|
||||
jenkinsAPIConnectionSettings := jenkinsClient.JenkinsAPIConnectionSettings{
|
||||
Hostname: *hostname,
|
||||
|
|
@ -104,7 +87,7 @@ var _ = BeforeSuite(func(done Done) {
|
|||
Scheme: k8sManager.GetScheme(),
|
||||
JenkinsAPIConnectionSettings: jenkinsAPIConnectionSettings,
|
||||
ClientSet: *clientSet,
|
||||
Config: *cfg,
|
||||
Config: *Cfg,
|
||||
NotificationEvents: ¬ificationEvents,
|
||||
KubernetesClusterDomain: "cluster.local",
|
||||
}).SetupWithManager(k8sManager)
|
||||
|
|
@ -115,8 +98,8 @@ var _ = BeforeSuite(func(done Done) {
|
|||
Expect(err).NotTo(HaveOccurred())
|
||||
}()
|
||||
|
||||
k8sClient = k8sManager.GetClient()
|
||||
Expect(k8sClient).NotTo(BeNil())
|
||||
K8sClient = k8sManager.GetClient()
|
||||
Expect(K8sClient).NotTo(BeNil())
|
||||
close(done)
|
||||
}, 60)
|
||||
|
||||
|
|
@ -125,39 +108,3 @@ var _ = AfterSuite(func() {
|
|||
err := testEnv.Stop()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
})
|
||||
|
||||
func createNamespace() *corev1.Namespace {
|
||||
By("creating temporary namespace")
|
||||
|
||||
namespace := &corev1.Namespace{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: fmt.Sprintf("%d", time.Now().Unix()),
|
||||
},
|
||||
}
|
||||
Expect(k8sClient.Create(context.TODO(), namespace)).Should(Succeed())
|
||||
return namespace
|
||||
}
|
||||
|
||||
func destroyNamespace(namespace *corev1.Namespace) {
|
||||
By("deleting temporary namespace")
|
||||
|
||||
Expect(k8sClient.Delete(context.TODO(), namespace)).Should(Succeed())
|
||||
|
||||
Eventually(func() (bool, error) {
|
||||
namespaces := &corev1.NamespaceList{}
|
||||
err := k8sClient.List(context.TODO(), namespaces)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
exists := false
|
||||
for _, namespaceItem := range namespaces.Items {
|
||||
if namespaceItem.Name == namespace.Name {
|
||||
exists = true
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
return !exists, nil
|
||||
}, time.Second*120, time.Second).Should(BeTrue())
|
||||
}
|
||||
|
|
|
|||
|
|
@ -0,0 +1,61 @@
|
|||
package e2e
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"time"
|
||||
|
||||
"github.com/onsi/ginkgo"
|
||||
"github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/client-go/rest"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
"sigs.k8s.io/controller-runtime/pkg/envtest"
|
||||
)
|
||||
|
||||
var (
|
||||
Cfg *rest.Config
|
||||
K8sClient client.Client
|
||||
testEnv *envtest.Environment
|
||||
|
||||
hostname *string
|
||||
port *int
|
||||
useNodePort *bool
|
||||
)
|
||||
|
||||
func CreateNamespace() *corev1.Namespace {
|
||||
ginkgo.By("creating temporary namespace")
|
||||
|
||||
namespace := &corev1.Namespace{
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: fmt.Sprintf("ns%d", time.Now().Unix()),
|
||||
},
|
||||
}
|
||||
gomega.Expect(K8sClient.Create(context.TODO(), namespace)).Should(gomega.Succeed())
|
||||
return namespace
|
||||
}
|
||||
|
||||
func DestroyNamespace(namespace *corev1.Namespace) {
|
||||
ginkgo.By("deleting temporary namespace")
|
||||
|
||||
gomega.Expect(K8sClient.Delete(context.TODO(), namespace)).Should(gomega.Succeed())
|
||||
|
||||
gomega.Eventually(func() (bool, error) {
|
||||
namespaces := &corev1.NamespaceList{}
|
||||
err := K8sClient.List(context.TODO(), namespaces)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
exists := false
|
||||
for _, namespaceItem := range namespaces.Items {
|
||||
if namespaceItem.Name == namespace.Name {
|
||||
exists = true
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
return !exists, nil
|
||||
}, time.Second*120, time.Second).Should(gomega.BeTrue())
|
||||
}
|
||||
|
|
@ -10,8 +10,8 @@ import (
|
|||
jenkinsclient "github.com/jenkinsci/kubernetes-operator/pkg/client"
|
||||
"github.com/jenkinsci/kubernetes-operator/pkg/configuration/base/resources"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
"github.com/onsi/ginkgo"
|
||||
"github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/labels"
|
||||
|
|
@ -23,36 +23,36 @@ var (
|
|||
retryInterval = time.Second * 5
|
||||
)
|
||||
|
||||
func waitForJenkinsBaseConfigurationToComplete(jenkins *v1alpha2.Jenkins) {
|
||||
By("waiting for Jenkins base configuration phase to complete")
|
||||
func WaitForJenkinsBaseConfigurationToComplete(jenkins *v1alpha2.Jenkins) {
|
||||
ginkgo.By("waiting for Jenkins base configuration phase to complete")
|
||||
|
||||
Eventually(func() (*metav1.Time, error) {
|
||||
gomega.Eventually(func() (*metav1.Time, error) {
|
||||
actualJenkins := &v1alpha2.Jenkins{}
|
||||
err := k8sClient.Get(context.TODO(), types.NamespacedName{Name: jenkins.Name, Namespace: jenkins.Namespace}, actualJenkins)
|
||||
err := K8sClient.Get(context.TODO(), types.NamespacedName{Name: jenkins.Name, Namespace: jenkins.Namespace}, actualJenkins)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return actualJenkins.Status.BaseConfigurationCompletedTime, nil
|
||||
}, time.Duration(170)*retryInterval, retryInterval).Should(Not(BeNil()))
|
||||
}, time.Duration(170)*retryInterval, retryInterval).Should(gomega.Not(gomega.BeNil()))
|
||||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Jenkins pod is running\n")
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Jenkins pod is running\n")
|
||||
|
||||
// update jenkins CR because Operator sets default values
|
||||
namespacedName := types.NamespacedName{Namespace: jenkins.Namespace, Name: jenkins.Name}
|
||||
Expect(k8sClient.Get(context.TODO(), namespacedName, jenkins)).Should(Succeed())
|
||||
gomega.Expect(K8sClient.Get(context.TODO(), namespacedName, jenkins)).Should(gomega.Succeed())
|
||||
}
|
||||
|
||||
func waitForRecreateJenkinsMasterPod(jenkins *v1alpha2.Jenkins) {
|
||||
By("waiting for Jenkins Master Pod recreation")
|
||||
ginkgo.By("waiting for Jenkins Master Pod recreation")
|
||||
|
||||
Eventually(func() (bool, error) {
|
||||
gomega.Eventually(func() (bool, error) {
|
||||
lo := &client.ListOptions{
|
||||
LabelSelector: labels.SelectorFromSet(resources.GetJenkinsMasterPodLabels(*jenkins)),
|
||||
Namespace: jenkins.Namespace,
|
||||
}
|
||||
pods := &corev1.PodList{}
|
||||
err := k8sClient.List(context.TODO(), pods, lo)
|
||||
err := K8sClient.List(context.TODO(), pods, lo)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
|
@ -61,31 +61,31 @@ func waitForRecreateJenkinsMasterPod(jenkins *v1alpha2.Jenkins) {
|
|||
}
|
||||
|
||||
return pods.Items[0].DeletionTimestamp == nil, nil
|
||||
}, 30*retryInterval, retryInterval).Should(BeTrue())
|
||||
}, 30*retryInterval, retryInterval).Should(gomega.BeTrue())
|
||||
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Jenkins pod has been recreated\n")
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Jenkins pod has been recreated\n")
|
||||
}
|
||||
|
||||
func waitForJenkinsUserConfigurationToComplete(jenkins *v1alpha2.Jenkins) {
|
||||
By("waiting for Jenkins user configuration phase to complete")
|
||||
func WaitForJenkinsUserConfigurationToComplete(jenkins *v1alpha2.Jenkins) {
|
||||
ginkgo.By("waiting for Jenkins user configuration phase to complete")
|
||||
|
||||
Eventually(func() (*metav1.Time, error) {
|
||||
gomega.Eventually(func() (*metav1.Time, error) {
|
||||
actualJenkins := &v1alpha2.Jenkins{}
|
||||
err := k8sClient.Get(context.TODO(), types.NamespacedName{Name: jenkins.Name, Namespace: jenkins.Namespace}, actualJenkins)
|
||||
err := K8sClient.Get(context.TODO(), types.NamespacedName{Name: jenkins.Name, Namespace: jenkins.Namespace}, actualJenkins)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return actualJenkins.Status.UserConfigurationCompletedTime, nil
|
||||
}, time.Duration(110)*retryInterval, retryInterval).Should(Not(BeNil()))
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Jenkins instance is up and ready\n")
|
||||
}, time.Duration(110)*retryInterval, retryInterval).Should(gomega.Not(gomega.BeNil()))
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Jenkins instance is up and ready\n")
|
||||
}
|
||||
|
||||
func waitForJenkinsSafeRestart(jenkinsClient jenkinsclient.Jenkins) {
|
||||
By("waiting for Jenkins safe restart")
|
||||
ginkgo.By("waiting for Jenkins safe restart")
|
||||
|
||||
Eventually(func() (bool, error) {
|
||||
gomega.Eventually(func() (bool, error) {
|
||||
status, err := jenkinsClient.Poll()
|
||||
_, _ = fmt.Fprintf(GinkgoWriter, "Safe restart status: %+v, err: %s\n", status, err)
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Safe restart status: %+v, err: %s\n", status, err)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
|
@ -93,5 +93,5 @@ func waitForJenkinsSafeRestart(jenkinsClient jenkinsclient.Jenkins) {
|
|||
return false, err
|
||||
}
|
||||
return true, nil
|
||||
}, time.Second*200, time.Second*5).Should(BeTrue())
|
||||
}, time.Second*200, time.Second*5).Should(gomega.BeTrue())
|
||||
}
|
||||
|
|
@ -0,0 +1,60 @@
|
|||
package helm
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"os/exec"
|
||||
|
||||
"github.com/jenkinsci/kubernetes-operator/api/v1alpha2"
|
||||
"github.com/jenkinsci/kubernetes-operator/test/e2e"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
// +kubebuilder:scaffold:imports
|
||||
)
|
||||
|
||||
var _ = Describe("Jenkins controller", func() {
|
||||
var (
|
||||
namespace *corev1.Namespace
|
||||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
namespace = e2e.CreateNamespace()
|
||||
})
|
||||
AfterEach(func() {
|
||||
showLogsIfTestHasFailed(CurrentGinkgoTestDescription().Failed, namespace.Name)
|
||||
e2e.DestroyNamespace(namespace)
|
||||
})
|
||||
Context("when deploying Helm Chart to cluster", func() {
|
||||
It("creates Jenkins instance and configures it", func() {
|
||||
|
||||
jenkins := &v1alpha2.Jenkins{
|
||||
TypeMeta: v1alpha2.JenkinsTypeMeta(),
|
||||
ObjectMeta: metav1.ObjectMeta{
|
||||
Name: "jenkins",
|
||||
Namespace: namespace.Name,
|
||||
},
|
||||
}
|
||||
|
||||
cmd := exec.Command("../../bin/helm", "upgrade", "jenkins", "../../chart/jenkins-operator", "--namespace", namespace.Name, "--debug",
|
||||
"--set-string", fmt.Sprintf("jenkins.namespace=%s", namespace.Name),
|
||||
"--set-string", fmt.Sprintf("operator.image=%s", *imageName), "--install")
|
||||
output, err := cmd.CombinedOutput()
|
||||
Expect(err).NotTo(HaveOccurred(), string(output))
|
||||
|
||||
e2e.WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
e2e.WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
|
||||
cmd = exec.Command("../../bin/helm", "upgrade", "jenkins", "../../chart/jenkins-operator", "--namespace", namespace.Name, "--debug",
|
||||
"--set-string", fmt.Sprintf("jenkins.namespace=%s", namespace.Name),
|
||||
"--set-string", fmt.Sprintf("operator.image=%s", *imageName), "--install")
|
||||
output, err = cmd.CombinedOutput()
|
||||
|
||||
Expect(err).NotTo(HaveOccurred(), string(output))
|
||||
|
||||
e2e.WaitForJenkinsBaseConfigurationToComplete(jenkins)
|
||||
e2e.WaitForJenkinsUserConfigurationToComplete(jenkins)
|
||||
})
|
||||
})
|
||||
})
|
||||
|
|
@ -0,0 +1,135 @@
|
|||
package helm
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"context"
|
||||
"fmt"
|
||||
"io"
|
||||
"sort"
|
||||
|
||||
"github.com/jenkinsci/kubernetes-operator/test/e2e"
|
||||
"github.com/onsi/ginkgo"
|
||||
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
"k8s.io/api/events/v1beta1"
|
||||
"k8s.io/apimachinery/pkg/labels"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
"sigs.k8s.io/controller-runtime/pkg/client"
|
||||
)
|
||||
|
||||
var (
|
||||
podLogTailLimit int64 = 15
|
||||
kubernetesEventsLimit int64 = 15
|
||||
// MUST match the labels in the deployment manifest: deploy/operator.yaml
|
||||
operatorPodLabels = map[string]string{
|
||||
"name": "jenkins-operator",
|
||||
}
|
||||
)
|
||||
|
||||
func getOperatorPod(namespace string) (*corev1.Pod, error) {
|
||||
lo := &client.ListOptions{
|
||||
LabelSelector: labels.SelectorFromSet(operatorPodLabels),
|
||||
Namespace: namespace,
|
||||
}
|
||||
pods := &corev1.PodList{}
|
||||
err := e2e.K8sClient.List(context.TODO(), pods, lo)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return &pods.Items[0], nil
|
||||
}
|
||||
|
||||
func getOperatorLogs(namespace string) (string, error) {
|
||||
pod, err := getOperatorPod(namespace)
|
||||
if err != nil {
|
||||
return "Operator pod doesn't exist", err
|
||||
}
|
||||
logOptions := corev1.PodLogOptions{TailLines: &podLogTailLimit}
|
||||
|
||||
// creates the clientset
|
||||
clientset, err := kubernetes.NewForConfig(e2e.Cfg)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
req := clientset.CoreV1().Pods(pod.Namespace).GetLogs(pod.Name, &logOptions)
|
||||
podLogs, err := req.Stream(context.TODO())
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
defer func() {
|
||||
if podLogs != nil {
|
||||
_ = podLogs.Close()
|
||||
}
|
||||
}()
|
||||
|
||||
buf := new(bytes.Buffer)
|
||||
_, err = io.Copy(buf, podLogs)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
logs := buf.String()
|
||||
return logs, nil
|
||||
}
|
||||
|
||||
func printOperatorLogs(namespace string) {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Operator logs in '%s' namespace:\n", namespace)
|
||||
logs, err := getOperatorLogs(namespace)
|
||||
if err != nil {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Couldn't get the operator pod logs: %s", err)
|
||||
} else {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Last %d lines of log from operator:\n %s", podLogTailLimit, logs)
|
||||
}
|
||||
}
|
||||
|
||||
func getKubernetesEvents(namespace string) ([]v1beta1.Event, error) {
|
||||
listOptions := &client.ListOptions{
|
||||
Limit: kubernetesEventsLimit,
|
||||
Namespace: namespace,
|
||||
}
|
||||
|
||||
events := &v1beta1.EventList{}
|
||||
err := e2e.K8sClient.List(context.TODO(), events, listOptions)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
sort.SliceStable(events.Items, func(i, j int) bool {
|
||||
return events.Items[i].CreationTimestamp.Unix() < events.Items[j].CreationTimestamp.Unix()
|
||||
})
|
||||
|
||||
return events.Items, nil
|
||||
}
|
||||
|
||||
func printKubernetesEvents(namespace string) {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Kubernetes events in '%s' namespace:\n", namespace)
|
||||
events, err := getKubernetesEvents(namespace)
|
||||
if err != nil {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Couldn't get kubernetes events: %s", err)
|
||||
} else {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Last %d events from kubernetes:\n", kubernetesEventsLimit)
|
||||
|
||||
for _, event := range events {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "%+v\n\n", event)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func printKubernetesPods(namespace string) {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "All pods in '%s' namespace:\n", namespace)
|
||||
|
||||
pod, err := getOperatorPod(namespace)
|
||||
if err == nil {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "%+v\n\n", pod)
|
||||
}
|
||||
}
|
||||
|
||||
func showLogsIfTestHasFailed(failed bool, namespace string) {
|
||||
if failed {
|
||||
_, _ = fmt.Fprintf(ginkgo.GinkgoWriter, "Test failed. Bellow here you can check logs:")
|
||||
|
||||
printKubernetesEvents(namespace)
|
||||
printKubernetesPods(namespace)
|
||||
printOperatorLogs(namespace)
|
||||
}
|
||||
}
|
||||
|
|
@ -0,0 +1,76 @@
|
|||
package helm
|
||||
|
||||
import (
|
||||
"flag"
|
||||
"testing"
|
||||
|
||||
"github.com/jenkinsci/kubernetes-operator/api/v1alpha2"
|
||||
"github.com/jenkinsci/kubernetes-operator/test/e2e"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
"k8s.io/client-go/kubernetes/scheme"
|
||||
ctrl "sigs.k8s.io/controller-runtime"
|
||||
"sigs.k8s.io/controller-runtime/pkg/envtest"
|
||||
"sigs.k8s.io/controller-runtime/pkg/envtest/printer"
|
||||
logf "sigs.k8s.io/controller-runtime/pkg/log"
|
||||
"sigs.k8s.io/controller-runtime/pkg/log/zap"
|
||||
// +kubebuilder:scaffold:imports
|
||||
)
|
||||
|
||||
var (
|
||||
testEnv *envtest.Environment
|
||||
imageName *string
|
||||
)
|
||||
|
||||
func init() {
|
||||
imageName = flag.String("image-name", "", "Name of the locally built for testing Jenkins Operator Image.")
|
||||
}
|
||||
|
||||
func TestHelm(t *testing.T) {
|
||||
RegisterFailHandler(Fail)
|
||||
|
||||
RunSpecsWithDefaultAndCustomReporters(t,
|
||||
"Controller Suite",
|
||||
[]Reporter{printer.NewlineReporter{}})
|
||||
}
|
||||
|
||||
var _ = BeforeSuite(func(done Done) {
|
||||
logf.SetLogger(zap.New(zap.WriteTo(GinkgoWriter), zap.UseDevMode(false)))
|
||||
|
||||
By("bootstrapping test environment")
|
||||
useExistingCluster := true
|
||||
testEnv = &envtest.Environment{
|
||||
UseExistingCluster: &useExistingCluster,
|
||||
}
|
||||
|
||||
cfg, err := testEnv.Start()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(cfg).NotTo(BeNil())
|
||||
|
||||
err = v1alpha2.AddToScheme(scheme.Scheme)
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
// +kubebuilder:scaffold:scheme
|
||||
|
||||
// setup manager
|
||||
k8sManager, err := ctrl.NewManager(cfg, ctrl.Options{
|
||||
Scheme: scheme.Scheme,
|
||||
})
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
|
||||
go func() {
|
||||
err = k8sManager.Start(ctrl.SetupSignalHandler())
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
}()
|
||||
|
||||
e2e.K8sClient = k8sManager.GetClient()
|
||||
Expect(e2e.K8sClient).NotTo(BeNil())
|
||||
close(done)
|
||||
}, 60)
|
||||
|
||||
var _ = AfterSuite(func() {
|
||||
By("tearing down the test environment")
|
||||
err := testEnv.Stop()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
})
|
||||
|
|
@ -59,7 +59,7 @@ GO_LDFLAGS_STATIC=-ldflags "-w $(CTIMEVAR) -extldflags -static"
|
|||
GOOSARCHES = linux/amd64
|
||||
|
||||
PACKAGES = $(shell go list -f '{{.ImportPath}}/' ./... | grep -v vendor)
|
||||
PACKAGES_FOR_UNIT_TESTS = $(shell go list -f '{{.ImportPath}}/' ./... | grep -v vendor | grep -v e2e | grep -v controllers)
|
||||
PACKAGES_FOR_UNIT_TESTS = $(shell go list -f '{{.ImportPath}}/' ./... | grep -v vendor | grep -v e2e | grep -v helm)
|
||||
|
||||
# Run all the e2e tests by default
|
||||
E2E_TEST_SELECTOR ?= .*
|
||||
|
|
|
|||
Loading…
Reference in New Issue