mirror of
https://github.com/argoproj/argo-cd
synced 2026-04-21 17:07:16 +00:00
285 lines
8 KiB
Go
285 lines
8 KiB
Go
package db
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
v1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/client-go/kubernetes/fake"
|
|
|
|
"github.com/argoproj/argo-cd/v2/common"
|
|
"github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1"
|
|
appv1 "github.com/argoproj/argo-cd/v2/pkg/apis/application/v1alpha1"
|
|
"github.com/argoproj/argo-cd/v2/util/settings"
|
|
)
|
|
|
|
const (
|
|
fakeNamespace = "fake-ns"
|
|
)
|
|
|
|
func Test_URIToSecretName(t *testing.T) {
|
|
name, err := URIToSecretName("cluster", "http://foo")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "cluster-foo-752281925", name)
|
|
}
|
|
|
|
func Test_secretToCluster(t *testing.T) {
|
|
labels := map[string]string{"key1": "val1"}
|
|
annotations := map[string]string{"key2": "val2"}
|
|
secret := &v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster",
|
|
Namespace: fakeNamespace,
|
|
Labels: labels,
|
|
Annotations: annotations,
|
|
},
|
|
Data: map[string][]byte{
|
|
"name": []byte("test"),
|
|
"server": []byte("http://mycluster"),
|
|
"config": []byte("{\"username\":\"foo\"}"),
|
|
},
|
|
}
|
|
cluster, err := secretToCluster(secret)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, *cluster, v1alpha1.Cluster{
|
|
Name: "test",
|
|
Server: "http://mycluster",
|
|
Config: v1alpha1.ClusterConfig{
|
|
Username: "foo",
|
|
},
|
|
Labels: labels,
|
|
Annotations: annotations,
|
|
})
|
|
}
|
|
|
|
func TestClusterToSecret(t *testing.T) {
|
|
cluster := &appv1.Cluster{
|
|
Server: "server",
|
|
Labels: map[string]string{"test": "label"},
|
|
Annotations: map[string]string{"test": "annotation"},
|
|
Name: "test",
|
|
Config: v1alpha1.ClusterConfig{},
|
|
Project: "project",
|
|
Namespaces: []string{"default"},
|
|
}
|
|
s := &v1.Secret{}
|
|
err := clusterToSecret(cluster, s)
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, []byte(cluster.Server), s.Data["server"])
|
|
assert.Equal(t, []byte(cluster.Name), s.Data["name"])
|
|
assert.Equal(t, []byte(cluster.Project), s.Data["project"])
|
|
assert.Equal(t, []byte("default"), s.Data["namespaces"])
|
|
assert.Equal(t, cluster.Annotations, s.Annotations)
|
|
assert.Equal(t, cluster.Labels, s.Labels)
|
|
}
|
|
|
|
func Test_secretToCluster_NoConfig(t *testing.T) {
|
|
secret := &v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster",
|
|
Namespace: fakeNamespace,
|
|
},
|
|
Data: map[string][]byte{
|
|
"name": []byte("test"),
|
|
"server": []byte("http://mycluster"),
|
|
},
|
|
}
|
|
cluster, err := secretToCluster(secret)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, *cluster, v1alpha1.Cluster{
|
|
Name: "test",
|
|
Server: "http://mycluster",
|
|
Labels: map[string]string{},
|
|
Annotations: map[string]string{},
|
|
})
|
|
}
|
|
|
|
func Test_secretToCluster_InvalidConfig(t *testing.T) {
|
|
secret := &v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster",
|
|
Namespace: fakeNamespace,
|
|
},
|
|
Data: map[string][]byte{
|
|
"name": []byte("test"),
|
|
"server": []byte("http://mycluster"),
|
|
"config": []byte("{'tlsClientConfig':{'insecure':false}}"),
|
|
},
|
|
}
|
|
cluster, err := secretToCluster(secret)
|
|
require.Error(t, err)
|
|
assert.Nil(t, cluster)
|
|
}
|
|
|
|
func TestUpdateCluster(t *testing.T) {
|
|
kubeclientset := fake.NewSimpleClientset(&v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster",
|
|
Namespace: fakeNamespace,
|
|
Labels: map[string]string{
|
|
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
|
|
},
|
|
},
|
|
Data: map[string][]byte{
|
|
"server": []byte("http://mycluster"),
|
|
"config": []byte("{}"),
|
|
},
|
|
})
|
|
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
|
|
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
|
|
requestedAt := metav1.Now()
|
|
_, err := db.UpdateCluster(context.Background(), &v1alpha1.Cluster{
|
|
Name: "test",
|
|
Server: "http://mycluster",
|
|
RefreshRequestedAt: &requestedAt,
|
|
})
|
|
if !assert.NoError(t, err) {
|
|
return
|
|
}
|
|
|
|
secret, err := kubeclientset.CoreV1().Secrets(fakeNamespace).Get(context.Background(), "mycluster", metav1.GetOptions{})
|
|
if !assert.NoError(t, err) {
|
|
return
|
|
}
|
|
|
|
assert.Equal(t, secret.Annotations[v1alpha1.AnnotationKeyRefresh], requestedAt.Format(time.RFC3339))
|
|
}
|
|
|
|
func TestDeleteUnknownCluster(t *testing.T) {
|
|
kubeclientset := fake.NewSimpleClientset(&v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster",
|
|
Namespace: fakeNamespace,
|
|
Labels: map[string]string{
|
|
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
|
|
},
|
|
},
|
|
Data: map[string][]byte{
|
|
"server": []byte("http://mycluster"),
|
|
"name": []byte("mycluster"),
|
|
},
|
|
})
|
|
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
|
|
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
|
|
assert.EqualError(t, db.DeleteCluster(context.Background(), "http://unknown"), `rpc error: code = NotFound desc = cluster "http://unknown" not found`)
|
|
}
|
|
|
|
func runWatchTest(t *testing.T, db ArgoDB, actions []func(old *v1alpha1.Cluster, new *v1alpha1.Cluster)) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
timeout := time.Second * 5
|
|
|
|
allDone := make(chan bool, 1)
|
|
|
|
doNext := func(old *v1alpha1.Cluster, new *v1alpha1.Cluster) {
|
|
if len(actions) == 0 {
|
|
assert.Fail(t, "Unexpected event")
|
|
}
|
|
next := actions[0]
|
|
next(old, new)
|
|
if t.Failed() {
|
|
allDone <- true
|
|
}
|
|
if len(actions) == 1 {
|
|
allDone <- true
|
|
} else {
|
|
actions = actions[1:]
|
|
}
|
|
}
|
|
|
|
go func() {
|
|
assert.NoError(t, db.WatchClusters(ctx, func(cluster *v1alpha1.Cluster) {
|
|
doNext(nil, cluster)
|
|
}, func(oldCluster *v1alpha1.Cluster, newCluster *v1alpha1.Cluster) {
|
|
doNext(oldCluster, newCluster)
|
|
}, func(clusterServer string) {
|
|
doNext(&v1alpha1.Cluster{Server: clusterServer}, nil)
|
|
}))
|
|
}()
|
|
|
|
select {
|
|
case <-allDone:
|
|
case <-time.After(timeout):
|
|
assert.Fail(t, "Failed due to timeout")
|
|
}
|
|
|
|
}
|
|
|
|
func TestListClusters(t *testing.T) {
|
|
validSecret1 := &v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster1",
|
|
Namespace: fakeNamespace,
|
|
Labels: map[string]string{
|
|
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
|
|
},
|
|
},
|
|
Data: map[string][]byte{
|
|
"server": []byte(appv1.KubernetesInternalAPIServerAddr),
|
|
"name": []byte("in-cluster"),
|
|
},
|
|
}
|
|
|
|
validSecret2 := &v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster2",
|
|
Namespace: fakeNamespace,
|
|
Labels: map[string]string{
|
|
common.LabelKeySecretType: common.LabelValueSecretTypeCluster,
|
|
},
|
|
},
|
|
Data: map[string][]byte{
|
|
"server": []byte("http://mycluster2"),
|
|
"name": []byte("mycluster2"),
|
|
},
|
|
}
|
|
|
|
invalidSecret := &v1.Secret{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "mycluster3",
|
|
Namespace: fakeNamespace,
|
|
},
|
|
Data: map[string][]byte{
|
|
"name": []byte("test"),
|
|
"server": []byte("http://mycluster3"),
|
|
"config": []byte("{'tlsClientConfig':{'insecure':false}}"),
|
|
},
|
|
}
|
|
|
|
t.Run("Valid clusters", func(t *testing.T) {
|
|
kubeclientset := fake.NewSimpleClientset(validSecret1, validSecret2)
|
|
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
|
|
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
|
|
|
|
clusters, err := db.ListClusters(context.TODO())
|
|
require.NoError(t, err)
|
|
assert.Len(t, clusters.Items, 2)
|
|
})
|
|
|
|
t.Run("Cluster list with invalid cluster", func(t *testing.T) {
|
|
kubeclientset := fake.NewSimpleClientset(validSecret1, validSecret2, invalidSecret)
|
|
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
|
|
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
|
|
|
|
clusters, err := db.ListClusters(context.TODO())
|
|
require.NoError(t, err)
|
|
assert.Len(t, clusters.Items, 2)
|
|
})
|
|
|
|
t.Run("Implicit in-cluster secret", func(t *testing.T) {
|
|
kubeclientset := fake.NewSimpleClientset(validSecret2)
|
|
settingsManager := settings.NewSettingsManager(context.Background(), kubeclientset, fakeNamespace)
|
|
db := NewDB(fakeNamespace, settingsManager, kubeclientset)
|
|
|
|
clusters, err := db.ListClusters(context.TODO())
|
|
require.NoError(t, err)
|
|
// ListClusters() should have added an implicit in-cluster secret to the list
|
|
assert.Len(t, clusters.Items, 2)
|
|
})
|
|
}
|