argo-cd/util/db/cluster_test.go
Alexander Matyushentsev 2147ed3aea
fix: cluster API should not drop system labels and annotations (#7212)
Signed-off-by: Alexander Matyushentsev <AMatyushentsev@gmail.com>
2021-09-14 10:37:57 -07:00

285 lines
8 KiB
Go

package db
import (
"context"
"testing"
"time"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
v1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes/fake"
"github.com/argoproj/argo-cd/v2/common"
"github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1"
appv1 "github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1"
"github.com/argoproj/argo-cd/v2/util/settings"
)
const (
fakeNamespace = "fake-ns"
)
func Test_URIToSecretName(t *testing.T) {
name, err := URIToSecretName("cluster", "http://foo")
assert.NoError(t, err)
assert.Equal(t, "cluster-foo-752281925", name)
}
func Test_secretToCluster(t *testing.T) {
labels := map[string]string{"key1": "val1"}
annotations := map[string]string{"key2": "val2"}
secret := &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster",
Namespace: fakeNamespace,
Labels: labels,
Annotations: annotations,
},
Data: map[string][]byte{
"name": []byte("test"),
"server": []byte("http://mycluster"),
"config": []byte("{\"username\":\"foo\"}"),
},
}
cluster, err := secretToCluster(secret)
require.NoError(t, err)
assert.Equal(t, *cluster, v1alpha1.Cluster{
Name: "test",
Server: "http://mycluster",
Config: v1alpha1.ClusterConfig{
Username: "foo",
},
Labels: labels,
Annotations: annotations,
})
}
func TestClusterToSecret(t *testing.T) {
cluster := &appv1.Cluster{
Server: "server",
Labels: map[string]string{"test": "label"},
Annotations: map[string]string{"test": "annotation"},
Name: "test",
Config: v1alpha1.ClusterConfig{},
Project: "project",
Namespaces: []string{"default"},
}
s := &v1.Secret{}
err := clusterToSecret(cluster, s)
assert.NoError(t, err)
assert.Equal(t, []byte(cluster.Server), s.Data["server"])
assert.Equal(t, []byte(cluster.Name), s.Data["name"])
assert.Equal(t, []byte(cluster.Project), s.Data["project"])
assert.Equal(t, []byte("default"), s.Data["namespaces"])
assert.Equal(t, cluster.Annotations, s.Annotations)
assert.Equal(t, cluster.Labels, s.Labels)
}
func Test_secretToCluster_NoConfig(t *testing.T) {
secret := &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster",
Namespace: fakeNamespace,
},
Data: map[string][]byte{
"name": []byte("test"),
"server": []byte("http://mycluster"),
},
}
cluster, err := secretToCluster(secret)
assert.NoError(t, err)
assert.Equal(t, *cluster, v1alpha1.Cluster{
Name: "test",
Server: "http://mycluster",
Labels: map[string]string{},
Annotations: map[string]string{},
})
}
func Test_secretToCluster_InvalidConfig(t *testing.T) {
secret := &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster",
Namespace: fakeNamespace,
},
Data: map[string][]byte{
"name": []byte("test"),
"server": []byte("http://mycluster"),
"config": []byte("{'tlsClientConfig':{'insecure':false}}"),
},
}
cluster, err := secretToCluster(secret)
require.Error(t, err)
assert.Nil(t, cluster)
}
func TestUpdateCluster(t *testing.T) {
kubeclientset := fake.NewSimpleClientset(&v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster",
Namespace: fakeNamespace,
Labels: map[string]string{
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
},
},
Data: map[string][]byte{
"server": []byte("http://mycluster"),
"config": []byte("{}"),
},
})
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
requestedAt := metav1.Now()
_, err := db.UpdateCluster(context.Background(), &v1alpha1.Cluster{
Name: "test",
Server: "http://mycluster",
RefreshRequestedAt: &requestedAt,
})
if !assert.NoError(t, err) {
return
}
secret, err := kubeclientset.CoreV1().Secrets(fakeNamespace).Get(context.Background(), "mycluster", metav1.GetOptions{})
if !assert.NoError(t, err) {
return
}
assert.Equal(t, secret.Annotations[v1alpha1.AnnotationKeyRefresh], requestedAt.Format(time.RFC3339))
}
func TestDeleteUnknownCluster(t *testing.T) {
kubeclientset := fake.NewSimpleClientset(&v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster",
Namespace: fakeNamespace,
Labels: map[string]string{
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
},
},
Data: map[string][]byte{
"server": []byte("http://mycluster"),
"name": []byte("mycluster"),
},
})
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
assert.EqualError(t, db.DeleteCluster(context.Background(), "http://unknown"), `rpc error: code = NotFound desc = cluster "http://unknown" not found`)
}
func runWatchTest(t *testing.T, db ArgoDB, actions []func(old *v1alpha1.Cluster, new *v1alpha1.Cluster)) {
ctx, cancel := context.WithCancel(context.Background())
defer cancel()
timeout := time.Second * 5
allDone := make(chan bool, 1)
doNext := func(old *v1alpha1.Cluster, new *v1alpha1.Cluster) {
if len(actions) == 0 {
assert.Fail(t, "Unexpected event")
}
next := actions[0]
next(old, new)
if t.Failed() {
allDone <- true
}
if len(actions) == 1 {
allDone <- true
} else {
actions = actions[1:]
}
}
go func() {
assert.NoError(t, db.WatchClusters(ctx, func(cluster *v1alpha1.Cluster) {
doNext(nil, cluster)
}, func(oldCluster *v1alpha1.Cluster, newCluster *v1alpha1.Cluster) {
doNext(oldCluster, newCluster)
}, func(clusterServer string) {
doNext(&v1alpha1.Cluster{Server: clusterServer}, nil)
}))
}()
select {
case <-allDone:
case <-time.After(timeout):
assert.Fail(t, "Failed due to timeout")
}
}
func TestListClusters(t *testing.T) {
validSecret1 := &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster1",
Namespace: fakeNamespace,
Labels: map[string]string{
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
},
},
Data: map[string][]byte{
"server": []byte(appv1.KubernetesInternalAPIServerAddr),
"name": []byte("in-cluster"),
},
}
validSecret2 := &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster2",
Namespace: fakeNamespace,
Labels: map[string]string{
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
},
},
Data: map[string][]byte{
"server": []byte("http://mycluster2"),
"name": []byte("mycluster2"),
},
}
invalidSecret := &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "mycluster3",
Namespace: fakeNamespace,
},
Data: map[string][]byte{
"name": []byte("test"),
"server": []byte("http://mycluster3"),
"config": []byte("{'tlsClientConfig':{'insecure':false}}"),
},
}
t.Run("Valid clusters", func(t *testing.T) {
kubeclientset := fake.NewSimpleClientset(validSecret1, validSecret2)
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
clusters, err := db.ListClusters(context.TODO())
require.NoError(t, err)
assert.Len(t, clusters.Items, 2)
})
t.Run("Cluster list with invalid cluster", func(t *testing.T) {
kubeclientset := fake.NewSimpleClientset(validSecret1, validSecret2, invalidSecret)
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
clusters, err := db.ListClusters(context.TODO())
require.NoError(t, err)
assert.Len(t, clusters.Items, 2)
})
t.Run("Implicit in-cluster secret", func(t *testing.T) {
kubeclientset := fake.NewSimpleClientset(validSecret2)
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
clusters, err := db.ListClusters(context.TODO())
require.NoError(t, err)
// ListClusters() should have added an implicit in-cluster secret to the list
assert.Len(t, clusters.Items, 2)
})
}