996 lines
26 KiB
Go
996 lines
26 KiB
Go
package base
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/jenkinsci/kubernetes-operator/api/v1alpha2"
|
|
"github.com/jenkinsci/kubernetes-operator/pkg/client"
|
|
"github.com/jenkinsci/kubernetes-operator/pkg/configuration"
|
|
"github.com/jenkinsci/kubernetes-operator/pkg/configuration/base/resources"
|
|
"github.com/jenkinsci/kubernetes-operator/pkg/log"
|
|
|
|
"github.com/bndr/gojenkins"
|
|
"github.com/golang/mock/gomock"
|
|
"github.com/stretchr/testify/assert"
|
|
corev1 "k8s.io/api/core/v1"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/client-go/kubernetes/scheme"
|
|
k8sclient "sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/controller-runtime/pkg/client/fake"
|
|
)
|
|
|
|
func TestCompareContainerVolumeMounts(t *testing.T) {
|
|
t.Run("happy with service account", func(t *testing.T) {
|
|
expectedContainer := corev1.Container{
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "volume-name",
|
|
MountPath: "/mount/path",
|
|
},
|
|
},
|
|
}
|
|
actualContainer := corev1.Container{
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "volume-name",
|
|
MountPath: "/mount/path",
|
|
},
|
|
{
|
|
Name: "jenkins-operator-example-token-dh4r9",
|
|
MountPath: "/var/run/secrets/kubernetes.io/serviceaccount",
|
|
ReadOnly: true,
|
|
},
|
|
},
|
|
}
|
|
|
|
got := CompareContainerVolumeMounts(expectedContainer, actualContainer)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("happy without service account", func(t *testing.T) {
|
|
expectedContainer := corev1.Container{
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "volume-name",
|
|
MountPath: "/mount/path",
|
|
},
|
|
},
|
|
}
|
|
actualContainer := corev1.Container{
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "volume-name",
|
|
MountPath: "/mount/path",
|
|
},
|
|
},
|
|
}
|
|
|
|
got := CompareContainerVolumeMounts(expectedContainer, actualContainer)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("different volume mounts", func(t *testing.T) {
|
|
expectedContainer := corev1.Container{
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "volume-name",
|
|
MountPath: "/mount/path",
|
|
},
|
|
},
|
|
}
|
|
actualContainer := corev1.Container{
|
|
VolumeMounts: []corev1.VolumeMount{
|
|
{
|
|
Name: "jenkins-operator-example-token-dh4r9",
|
|
MountPath: "/var/run/secrets/kubernetes.io/serviceaccount",
|
|
ReadOnly: true,
|
|
},
|
|
},
|
|
}
|
|
|
|
got := CompareContainerVolumeMounts(expectedContainer, actualContainer)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
}
|
|
|
|
func TestCompareVolumes(t *testing.T) {
|
|
t.Run("defaults", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{}
|
|
pod := corev1.Pod{
|
|
Spec: corev1.PodSpec{
|
|
ServiceAccountName: "service-account-name",
|
|
Volumes: resources.GetJenkinsMasterPodBaseVolumes(jenkins),
|
|
},
|
|
}
|
|
reconciler := New(configuration.Configuration{Jenkins: jenkins}, client.JenkinsAPIConnectionSettings{})
|
|
|
|
got := reconciler.compareVolumes(pod)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("different", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
Volumes: []corev1.Volume{
|
|
{
|
|
Name: "added",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
pod := corev1.Pod{
|
|
Spec: corev1.PodSpec{
|
|
ServiceAccountName: "service-account-name",
|
|
Volumes: resources.GetJenkinsMasterPodBaseVolumes(jenkins),
|
|
},
|
|
}
|
|
reconciler := New(configuration.Configuration{Jenkins: jenkins}, client.JenkinsAPIConnectionSettings{})
|
|
|
|
got := reconciler.compareVolumes(pod)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("added one volume", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
Volumes: []corev1.Volume{
|
|
{
|
|
Name: "added",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
pod := corev1.Pod{
|
|
Spec: corev1.PodSpec{
|
|
ServiceAccountName: "service-account-name",
|
|
Volumes: append(resources.GetJenkinsMasterPodBaseVolumes(jenkins), corev1.Volume{Name: "added"}),
|
|
},
|
|
}
|
|
reconciler := New(configuration.Configuration{Jenkins: jenkins}, client.JenkinsAPIConnectionSettings{})
|
|
|
|
got := reconciler.compareVolumes(pod)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
}
|
|
|
|
func TestJenkinsBaseConfigurationReconciler_verifyPlugins(t *testing.T) {
|
|
log.SetupLogger(true)
|
|
|
|
t.Run("happy, empty base and user plugins", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("happy, not empty base and user plugins", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
BasePlugins: []v1alpha2.Plugin{{Name: "plugin-name1", Version: "0.0.1"}},
|
|
Plugins: []v1alpha2.Plugin{{Name: "plugin-name2", Version: "0.0.1"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{
|
|
{
|
|
ShortName: "plugin-name1",
|
|
Active: true,
|
|
Deleted: false,
|
|
Enabled: true,
|
|
Version: "0.0.1",
|
|
},
|
|
{
|
|
ShortName: "plugin-name2",
|
|
Active: true,
|
|
Deleted: false,
|
|
Enabled: true,
|
|
Version: "0.0.1",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("happy, not empty base and empty user plugins", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
BasePlugins: []v1alpha2.Plugin{{Name: "plugin-name", Version: "0.0.1"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{
|
|
{
|
|
ShortName: "plugin-name",
|
|
Active: true,
|
|
Deleted: false,
|
|
Enabled: true,
|
|
Version: "0.0.1",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("happy, empty base and not empty user plugins", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
Plugins: []v1alpha2.Plugin{{Name: "plugin-name", Version: "0.0.1"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{
|
|
{
|
|
ShortName: "plugin-name",
|
|
Active: true,
|
|
Deleted: false,
|
|
Enabled: true,
|
|
Version: "0.0.1",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("happy, plugin version matter for base plugins", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
BasePlugins: []v1alpha2.Plugin{{Name: "plugin-name", Version: "0.0.1"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{
|
|
{
|
|
ShortName: "plugin-name",
|
|
Active: true,
|
|
Deleted: false,
|
|
Enabled: true,
|
|
Version: "0.0.2",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("plugin version matter for user plugins", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
Plugins: []v1alpha2.Plugin{{Name: "plugin-name", Version: "0.0.2"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{
|
|
{
|
|
ShortName: "plugin-name",
|
|
Active: true,
|
|
Deleted: false,
|
|
Enabled: true,
|
|
Version: "0.0.1",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("missing base plugin", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
BasePlugins: []v1alpha2.Plugin{{Name: "plugin-name", Version: "0.0.2"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("missing user plugin", func(t *testing.T) {
|
|
jenkins := &v1alpha2.Jenkins{
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Master: v1alpha2.JenkinsMaster{
|
|
Plugins: []v1alpha2.Plugin{{Name: "plugin-name", Version: "0.0.2"}},
|
|
},
|
|
},
|
|
}
|
|
r := JenkinsBaseConfigurationReconciler{
|
|
logger: log.Log,
|
|
Configuration: configuration.Configuration{
|
|
Jenkins: jenkins,
|
|
},
|
|
}
|
|
pluginsInJenkins := &gojenkins.Plugins{
|
|
Raw: &gojenkins.PluginResponse{
|
|
Plugins: []gojenkins.Plugin{},
|
|
},
|
|
}
|
|
ctrl := gomock.NewController(t)
|
|
defer ctrl.Finish()
|
|
jenkinsClient := client.NewMockJenkins(ctrl)
|
|
jenkinsClient.EXPECT().GetPlugins(fetchAllPlugins).Return(pluginsInJenkins, nil)
|
|
|
|
got, err := r.verifyPlugins(jenkinsClient)
|
|
|
|
assert.NoError(t, err)
|
|
assert.False(t, got)
|
|
})
|
|
}
|
|
|
|
func Test_compareEnv(t *testing.T) {
|
|
t.Run("empty", func(t *testing.T) {
|
|
var expected []corev1.EnvVar
|
|
var actual []corev1.EnvVar
|
|
|
|
got := compareEnv(expected, actual)
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("same", func(t *testing.T) {
|
|
expected := []corev1.EnvVar{
|
|
{
|
|
Name: "name",
|
|
Value: "value",
|
|
},
|
|
}
|
|
actual := []corev1.EnvVar{
|
|
{
|
|
Name: "name",
|
|
Value: "value",
|
|
},
|
|
}
|
|
|
|
got := compareEnv(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("with KUBERNETES envs", func(t *testing.T) {
|
|
expected := []corev1.EnvVar{
|
|
{
|
|
Name: "name",
|
|
Value: "value",
|
|
},
|
|
}
|
|
actual := []corev1.EnvVar{
|
|
{
|
|
Name: "name",
|
|
Value: "value",
|
|
},
|
|
{
|
|
Name: "KUBERNETES_PORT_443_TCP_ADDR",
|
|
Value: "KUBERNETES_PORT_443_TCP_ADDR",
|
|
},
|
|
{
|
|
Name: "KUBERNETES_PORT",
|
|
Value: "KUBERNETES_PORT",
|
|
},
|
|
{
|
|
Name: "KUBERNETES_PORT_443_TCP",
|
|
Value: "KUBERNETES_PORT_443_TCP",
|
|
},
|
|
{
|
|
Name: "KUBERNETES_SERVICE_HOST",
|
|
Value: "KUBERNETES_SERVICE_HOST",
|
|
},
|
|
}
|
|
|
|
got := compareEnv(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("different", func(t *testing.T) {
|
|
expected := []corev1.EnvVar{
|
|
{
|
|
Name: "name",
|
|
Value: "value",
|
|
},
|
|
}
|
|
actual := []corev1.EnvVar{
|
|
{
|
|
Name: "name2",
|
|
Value: "value2",
|
|
},
|
|
}
|
|
|
|
got := compareEnv(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
}
|
|
|
|
func TestCompareMap(t *testing.T) {
|
|
t.Run("empty", func(t *testing.T) {
|
|
expectedAnnotations := map[string]string{}
|
|
actualAnnotations := map[string]string{}
|
|
|
|
got := compareMap(expectedAnnotations, actualAnnotations)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("the same", func(t *testing.T) {
|
|
expectedAnnotations := map[string]string{"one": "two"}
|
|
actualAnnotations := expectedAnnotations
|
|
|
|
got := compareMap(expectedAnnotations, actualAnnotations)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("one extra annotation in pod", func(t *testing.T) {
|
|
expectedAnnotations := map[string]string{"one": "two"}
|
|
actualAnnotations := map[string]string{"one": "two", "three": "four"}
|
|
|
|
got := compareMap(expectedAnnotations, actualAnnotations)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("one missing annotation", func(t *testing.T) {
|
|
expectedAnnotations := map[string]string{"one": "two"}
|
|
actualAnnotations := map[string]string{"three": "four"}
|
|
|
|
got := compareMap(expectedAnnotations, actualAnnotations)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("one value is different", func(t *testing.T) {
|
|
expectedAnnotations := map[string]string{"one": "two"}
|
|
actualAnnotations := map[string]string{"one": "three"}
|
|
|
|
got := compareMap(expectedAnnotations, actualAnnotations)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("one missing annotation and one value is different", func(t *testing.T) {
|
|
expectedAnnotations := map[string]string{"one": "two", "missing": "something"}
|
|
actualAnnotations := map[string]string{"one": "three"}
|
|
|
|
got := compareMap(expectedAnnotations, actualAnnotations)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
}
|
|
|
|
func TestCompareImagePullSecrets(t *testing.T) {
|
|
t.Run("empty", func(t *testing.T) {
|
|
var expected []corev1.LocalObjectReference
|
|
var actual []corev1.LocalObjectReference
|
|
|
|
got := compareImagePullSecrets(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("the same", func(t *testing.T) {
|
|
expected := []corev1.LocalObjectReference{{Name: "test"}}
|
|
actual := []corev1.LocalObjectReference{{Name: "test"}}
|
|
|
|
got := compareImagePullSecrets(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("one extra pull secret in pod", func(t *testing.T) {
|
|
var expected []corev1.LocalObjectReference
|
|
actual := []corev1.LocalObjectReference{{Name: "test"}}
|
|
|
|
got := compareImagePullSecrets(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("one missing image pull secret", func(t *testing.T) {
|
|
expected := []corev1.LocalObjectReference{{Name: "test"}}
|
|
var actual []corev1.LocalObjectReference
|
|
|
|
got := compareImagePullSecrets(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
}
|
|
|
|
func TestEnsureExtraRBAC(t *testing.T) {
|
|
namespace := "default"
|
|
jenkinsName := "example"
|
|
log.SetupLogger(true)
|
|
|
|
fetchAllRoleBindings := func(client k8sclient.Client) (roleBindings *rbacv1.RoleBindingList, err error) {
|
|
roleBindings = &rbacv1.RoleBindingList{}
|
|
err = client.List(context.TODO(), roleBindings, k8sclient.InNamespace(namespace))
|
|
return
|
|
}
|
|
|
|
t.Run("empty", func(t *testing.T) {
|
|
// given
|
|
fakeClient := fake.NewClientBuilder().Build()
|
|
err := v1alpha2.SchemeBuilder.AddToScheme(scheme.Scheme)
|
|
assert.NoError(t, err)
|
|
|
|
jenkins := &v1alpha2.Jenkins{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: jenkinsName,
|
|
Namespace: namespace,
|
|
},
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Roles: []rbacv1.RoleRef{},
|
|
},
|
|
}
|
|
config := configuration.Configuration{
|
|
Client: fakeClient,
|
|
Jenkins: jenkins,
|
|
Scheme: scheme.Scheme,
|
|
}
|
|
reconciler := New(config, client.JenkinsAPIConnectionSettings{})
|
|
metaObject := resources.NewResourceObjectMeta(jenkins)
|
|
|
|
// when
|
|
err = reconciler.createRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
err = reconciler.ensureExtraRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
|
|
// then
|
|
roleBindings, err := fetchAllRoleBindings(fakeClient)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 1, len(roleBindings.Items))
|
|
assert.Equal(t, metaObject.Name, roleBindings.Items[0].Name)
|
|
})
|
|
clusterRoleKind := "ClusterRole"
|
|
t.Run("one extra", func(t *testing.T) {
|
|
// given
|
|
fakeClient := fake.NewClientBuilder().Build()
|
|
err := v1alpha2.SchemeBuilder.AddToScheme(scheme.Scheme)
|
|
assert.NoError(t, err)
|
|
|
|
jenkins := &v1alpha2.Jenkins{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: jenkinsName,
|
|
Namespace: namespace,
|
|
},
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Roles: []rbacv1.RoleRef{
|
|
{APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "edit",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
config := configuration.Configuration{
|
|
Client: fakeClient,
|
|
Jenkins: jenkins,
|
|
Scheme: scheme.Scheme,
|
|
}
|
|
reconciler := New(config, client.JenkinsAPIConnectionSettings{})
|
|
metaObject := resources.NewResourceObjectMeta(jenkins)
|
|
|
|
// when
|
|
err = reconciler.createRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
err = reconciler.ensureExtraRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
|
|
// then
|
|
roleBindings, err := fetchAllRoleBindings(fakeClient)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 2, len(roleBindings.Items))
|
|
assert.Equal(t, metaObject.Name, roleBindings.Items[0].Name)
|
|
assert.Equal(t, jenkins.Spec.Roles[0], roleBindings.Items[1].RoleRef)
|
|
})
|
|
t.Run("two extra", func(t *testing.T) {
|
|
// given
|
|
fakeClient := fake.NewClientBuilder().Build()
|
|
err := v1alpha2.SchemeBuilder.AddToScheme(scheme.Scheme)
|
|
assert.NoError(t, err)
|
|
|
|
jenkins := &v1alpha2.Jenkins{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: jenkinsName,
|
|
Namespace: namespace,
|
|
},
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Roles: []rbacv1.RoleRef{
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "admin",
|
|
},
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "edit",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
config := configuration.Configuration{
|
|
Client: fakeClient,
|
|
Jenkins: jenkins,
|
|
Scheme: scheme.Scheme,
|
|
}
|
|
reconciler := New(config, client.JenkinsAPIConnectionSettings{})
|
|
metaObject := resources.NewResourceObjectMeta(jenkins)
|
|
|
|
// when
|
|
err = reconciler.createRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
err = reconciler.ensureExtraRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
|
|
// then
|
|
roleBindings, err := fetchAllRoleBindings(fakeClient)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 3, len(roleBindings.Items))
|
|
assert.Equal(t, metaObject.Name, roleBindings.Items[0].Name)
|
|
assert.Equal(t, jenkins.Spec.Roles[0], roleBindings.Items[1].RoleRef)
|
|
assert.Equal(t, jenkins.Spec.Roles[1], roleBindings.Items[2].RoleRef)
|
|
})
|
|
t.Run("delete one extra", func(t *testing.T) {
|
|
// given
|
|
fakeClient := fake.NewClientBuilder().Build()
|
|
err := v1alpha2.SchemeBuilder.AddToScheme(scheme.Scheme)
|
|
assert.NoError(t, err)
|
|
|
|
jenkins := &v1alpha2.Jenkins{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: jenkinsName,
|
|
Namespace: namespace,
|
|
},
|
|
Spec: v1alpha2.JenkinsSpec{
|
|
Roles: []rbacv1.RoleRef{
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "admin",
|
|
},
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "edit",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
config := configuration.Configuration{
|
|
Client: fakeClient,
|
|
Jenkins: jenkins,
|
|
Scheme: scheme.Scheme,
|
|
}
|
|
reconciler := New(config, client.JenkinsAPIConnectionSettings{})
|
|
metaObject := resources.NewResourceObjectMeta(jenkins)
|
|
|
|
// when
|
|
roleBindingSkipMe := resources.NewRoleBinding("skip-me", namespace, metaObject.Name, rbacv1.RoleRef{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "edit",
|
|
})
|
|
err = reconciler.CreateOrUpdateResource(roleBindingSkipMe)
|
|
assert.NoError(t, err)
|
|
err = reconciler.createRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
err = reconciler.ensureExtraRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
jenkins.Spec.Roles = []rbacv1.RoleRef{
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: clusterRoleKind,
|
|
Name: "admin",
|
|
},
|
|
}
|
|
err = reconciler.ensureExtraRBAC(metaObject)
|
|
assert.NoError(t, err)
|
|
|
|
// then
|
|
roleBindings, err := fetchAllRoleBindings(fakeClient)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, 3, len(roleBindings.Items))
|
|
assert.Equal(t, metaObject.Name, roleBindings.Items[0].Name)
|
|
assert.Equal(t, jenkins.Spec.Roles[0], roleBindings.Items[1].RoleRef)
|
|
})
|
|
}
|
|
|
|
func TestCompareContainerResources(t *testing.T) {
|
|
t.Run("empty", func(t *testing.T) {
|
|
var expected corev1.ResourceRequirements
|
|
var actual corev1.ResourceRequirements
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("expected resources empty, actual resources set", func(t *testing.T) {
|
|
var expected corev1.ResourceRequirements
|
|
actual := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
corev1.ResourceMemory: resource.MustParse("50Mi"),
|
|
},
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("100m"),
|
|
corev1.ResourceMemory: resource.MustParse("100Mi"),
|
|
},
|
|
}
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("request CPU the same values", func(t *testing.T) {
|
|
actual := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
},
|
|
}
|
|
expected := actual
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("request memory the same values", func(t *testing.T) {
|
|
actual := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("50Mi"),
|
|
},
|
|
}
|
|
expected := actual
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("limit CPU the same values", func(t *testing.T) {
|
|
actual := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
},
|
|
}
|
|
expected := actual
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("limit memory the same values", func(t *testing.T) {
|
|
actual := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("50Mi"),
|
|
},
|
|
}
|
|
expected := actual
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.True(t, got)
|
|
})
|
|
t.Run("request CPU different values", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("5m"),
|
|
},
|
|
}
|
|
actual := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
},
|
|
}
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("request memory different values", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("5Mi"),
|
|
},
|
|
}
|
|
actual := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("50Mi"),
|
|
},
|
|
}
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("limit CPU different values", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("5m"),
|
|
},
|
|
}
|
|
actual := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
},
|
|
}
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("limit memory different values", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("5Mi"),
|
|
},
|
|
}
|
|
actual := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("50Mi"),
|
|
},
|
|
}
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("request CPU not set in actual", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("5m"),
|
|
},
|
|
}
|
|
var actual corev1.ResourceRequirements
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("request memory not set in actual", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("5Mi"),
|
|
},
|
|
}
|
|
var actual corev1.ResourceRequirements
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("limit CPU not set in actual", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("5m"),
|
|
},
|
|
}
|
|
var actual corev1.ResourceRequirements
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
t.Run("limit memory not set in actual", func(t *testing.T) {
|
|
expected := corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceMemory: resource.MustParse("5Mi"),
|
|
},
|
|
}
|
|
var actual corev1.ResourceRequirements
|
|
|
|
got := compareContainerResources(expected, actual)
|
|
|
|
assert.False(t, got)
|
|
})
|
|
}
|