mirror of
https://github.com/kubernetes-sigs/kustomize.git
synced 2026-05-18 02:45:17 +00:00
- In ResMap, drop concept of internal Id to Resource map. The ResMap is now (just) a list, allowing only very particular edits. - Resources should now be maintained in the order loaded. A later PR can adjust tests to remove the internal legacy sorting, and confirm order-out is predictable from order-in. The PR would suppress the sort in tests, and reorder the output to make all tests pass again, and confirm that the new order matched depth-first input traversal. The FromMap fixture function was removed from all test inputs to establish a predictable input order. - Resources now have two 'Ids', OriginalId and CurrentId. The former is fixed as GVK-name-namespace at load time, the latter changes during transformations. The latter can be used to narrow name references when the former maps to multiple resources. We allow bases to be loaded more than once in a build (a diamond pattern), so the OriginalId is not unique across the resources set. The CurrentId is (and must be) unique, but is constantly mutating. Failing to make this distinction clear, and attempting to maintain a mapping from a single mutating Id to a resource was making the code too complex. - Drop prefix/suffix from ResId - the ResId is now immutable. A later PR can remove the distinction with ItemId. - This PR increases coverage of ResMap is since this is a large refactor. Higher level tests didn't need much change outside reordering of results at the resource level.
1000 lines
21 KiB
Go
1000 lines
21 KiB
Go
/*
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package target_test
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"sigs.k8s.io/kustomize/pkg/kusttest"
|
|
)
|
|
|
|
func TestVariableRef(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/overlay/staging")
|
|
th.WriteK("/app/base", `
|
|
namePrefix: base-
|
|
resources:
|
|
- cockroachdb-statefulset-secure.yaml
|
|
- cronjob.yaml
|
|
configMapGenerator:
|
|
- name: test-config-map
|
|
literals:
|
|
- foo=bar
|
|
- baz=qux
|
|
vars:
|
|
- name: CDB_PUBLIC_SVC
|
|
objref:
|
|
kind: Service
|
|
name: cockroachdb-public
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
- name: CDB_STATEFULSET_NAME
|
|
objref:
|
|
kind: StatefulSet
|
|
name: cockroachdb
|
|
apiVersion: apps/v1beta1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
- name: CDB_STATEFULSET_SVC
|
|
objref:
|
|
kind: Service
|
|
name: cockroachdb
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
|
|
- name: TEST_CONFIG_MAP
|
|
objref:
|
|
kind: ConfigMap
|
|
name: test-config-map
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name`)
|
|
th.WriteF("/app/base/cronjob.yaml", `
|
|
apiVersion: batch/v1beta1
|
|
kind: CronJob
|
|
metadata:
|
|
name: cronjob-example
|
|
spec:
|
|
schedule: "*/1 * * * *"
|
|
concurrencyPolicy: Forbid
|
|
jobTemplate:
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: cronjob-example
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
command:
|
|
- echo
|
|
- "$(CDB_STATEFULSET_NAME)"
|
|
- "$(TEST_CONFIG_MAP)"
|
|
env:
|
|
- name: CDB_PUBLIC_SVC
|
|
value: "$(CDB_PUBLIC_SVC)"
|
|
`)
|
|
th.WriteF("/app/base/cockroachdb-statefulset-secure.yaml", `
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: Role
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- secrets
|
|
verbs:
|
|
- create
|
|
- get
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- certificates.k8s.io
|
|
resources:
|
|
- certificatesigningrequests
|
|
verbs:
|
|
- create
|
|
- get
|
|
- watch
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
# This service is meant to be used by clients of the database. It exposes a ClusterIP that will
|
|
# automatically load balance connections to the different database pods.
|
|
name: cockroachdb-public
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
ports:
|
|
# The main port, served by gRPC, serves Postgres-flavor SQL, internode
|
|
# traffic and the cli.
|
|
- port: 26257
|
|
targetPort: 26257
|
|
name: grpc
|
|
# The secondary port serves the UI as well as health and debug endpoints.
|
|
- port: 8080
|
|
targetPort: 8080
|
|
name: http
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
annotations:
|
|
service.alpha.kubernetes.io/tolerate-unready-endpoints: "true"
|
|
# Enable automatic monitoring of all instances when Prometheus is running in the cluster.
|
|
prometheus.io/scrape: "true"
|
|
prometheus.io/path: "_status/vars"
|
|
prometheus.io/port: "8080"
|
|
spec:
|
|
ports:
|
|
- port: 26257
|
|
targetPort: 26257
|
|
name: grpc
|
|
- port: 8080
|
|
targetPort: 8080
|
|
name: http
|
|
clusterIP: None
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: policy/v1beta1
|
|
kind: PodDisruptionBudget
|
|
metadata:
|
|
name: cockroachdb-budget
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app: cockroachdb
|
|
maxUnavailable: 1
|
|
---
|
|
apiVersion: apps/v1beta1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: cockroachdb
|
|
spec:
|
|
serviceName: "cockroachdb"
|
|
replicas: 3
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
serviceAccountName: cockroachdb
|
|
# Init containers are run only once in the lifetime of a pod, before
|
|
# it's started up for the first time. It has to exit successfully
|
|
# before the pod's main containers are allowed to start.
|
|
initContainers:
|
|
# The init-certs container sends a certificate signing request to the
|
|
# kubernetes cluster.
|
|
# You can see pending requests using: kubectl get csr
|
|
# CSRs can be approved using: kubectl certificate approve <csr name>
|
|
#
|
|
# All addresses used to contact a node must be specified in the --addresses arg.
|
|
#
|
|
# In addition to the node certificate and key, the init-certs entrypoint will symlink
|
|
# the cluster CA to the certs directory.
|
|
- name: init-certs
|
|
image: cockroachdb/cockroach-k8s-request-cert:0.2
|
|
imagePullPolicy: IfNotPresent
|
|
command:
|
|
- "/bin/ash"
|
|
- "-ecx"
|
|
- "/request-cert"
|
|
- -namespace=${POD_NAMESPACE}
|
|
- -certs-dir=/cockroach-certs
|
|
- -type=node
|
|
- -addresses=localhost,127.0.0.1,${POD_IP},$(hostname -f),$(hostname -f|cut -f 1-2 -d '.'),$(CDB_PUBLIC_SVC)
|
|
- -symlink-ca-from=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
env:
|
|
- name: POD_IP
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: status.podIP
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
volumeMounts:
|
|
- name: certs
|
|
mountPath: /cockroach-certs
|
|
|
|
affinity:
|
|
podAntiAffinity:
|
|
preferredDuringSchedulingIgnoredDuringExecution:
|
|
- weight: 100
|
|
podAffinityTerm:
|
|
labelSelector:
|
|
matchExpressions:
|
|
- key: app
|
|
operator: In
|
|
values:
|
|
- cockroachdb
|
|
topologyKey: kubernetes.io/hostname
|
|
containers:
|
|
- name: cockroachdb
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
imagePullPolicy: IfNotPresent
|
|
ports:
|
|
- containerPort: 26257
|
|
name: grpc
|
|
- containerPort: 8080
|
|
name: http
|
|
volumeMounts:
|
|
- name: datadir
|
|
mountPath: /cockroach/cockroach-data
|
|
- name: certs
|
|
mountPath: /cockroach/cockroach-certs
|
|
command:
|
|
- "/bin/bash"
|
|
- "-ecx"
|
|
- "exec /cockroach/cockroach start --logtostderr"
|
|
- --certs-dir /cockroach/cockroach-certs
|
|
- --host $(hostname -f)
|
|
- --http-host 0.0.0.0
|
|
- --join $(CDB_STATEFULSET_NAME)-0.$(CDB_STATEFULSET_SVC),$(CDB_STATEFULSET_NAME)-1.$(CDB_STATEFULSET_SVC),$(CDB_STATEFULSET_NAME)-2.$(CDB_STATEFULSET_SVC)
|
|
- --cache 25%
|
|
- --max-sql-memory 25%
|
|
# No pre-stop hook is required, a SIGTERM plus some time is all that's
|
|
# needed for graceful shutdown of a node.
|
|
terminationGracePeriodSeconds: 60
|
|
volumes:
|
|
- name: datadir
|
|
persistentVolumeClaim:
|
|
claimName: datadir
|
|
- name: certs
|
|
emptyDir: {}
|
|
updateStrategy:
|
|
type: RollingUpdate
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: datadir
|
|
spec:
|
|
accessModes:
|
|
- "ReadWriteOnce"
|
|
resources:
|
|
requests:
|
|
storage: 1Gi
|
|
`)
|
|
th.WriteK("/app/overlay/staging", `
|
|
namePrefix: dev-
|
|
bases:
|
|
- ../../base
|
|
`)
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: Role
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- secrets
|
|
verbs:
|
|
- create
|
|
- get
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRole
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- certificates.k8s.io
|
|
resources:
|
|
- certificatesigningrequests
|
|
verbs:
|
|
- create
|
|
- get
|
|
- watch
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: RoleBinding
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: dev-base-cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: dev-base-cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: dev-base-cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: dev-base-cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: v1
|
|
data:
|
|
baz: qux
|
|
foo: bar
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: dev-base-test-config-map-b2g2dmd64b
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
annotations:
|
|
prometheus.io/path: _status/vars
|
|
prometheus.io/port: "8080"
|
|
prometheus.io/scrape: "true"
|
|
service.alpha.kubernetes.io/tolerate-unready-endpoints: "true"
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
spec:
|
|
clusterIP: None
|
|
ports:
|
|
- name: grpc
|
|
port: 26257
|
|
targetPort: 26257
|
|
- name: http
|
|
port: 8080
|
|
targetPort: 8080
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb-public
|
|
spec:
|
|
ports:
|
|
- name: grpc
|
|
port: 26257
|
|
targetPort: 26257
|
|
- name: http
|
|
port: 8080
|
|
targetPort: 8080
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: apps/v1beta1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: dev-base-cockroachdb
|
|
spec:
|
|
replicas: 3
|
|
serviceName: dev-base-cockroachdb
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
affinity:
|
|
podAntiAffinity:
|
|
preferredDuringSchedulingIgnoredDuringExecution:
|
|
- podAffinityTerm:
|
|
labelSelector:
|
|
matchExpressions:
|
|
- key: app
|
|
operator: In
|
|
values:
|
|
- cockroachdb
|
|
topologyKey: kubernetes.io/hostname
|
|
weight: 100
|
|
containers:
|
|
- command:
|
|
- /bin/bash
|
|
- -ecx
|
|
- exec /cockroach/cockroach start --logtostderr
|
|
- --certs-dir /cockroach/cockroach-certs
|
|
- --host $(hostname -f)
|
|
- --http-host 0.0.0.0
|
|
- --join dev-base-cockroachdb-0.dev-base-cockroachdb,dev-base-cockroachdb-1.dev-base-cockroachdb,dev-base-cockroachdb-2.dev-base-cockroachdb
|
|
- --cache 25%
|
|
- --max-sql-memory 25%
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
imagePullPolicy: IfNotPresent
|
|
name: cockroachdb
|
|
ports:
|
|
- containerPort: 26257
|
|
name: grpc
|
|
- containerPort: 8080
|
|
name: http
|
|
volumeMounts:
|
|
- mountPath: /cockroach/cockroach-data
|
|
name: datadir
|
|
- mountPath: /cockroach/cockroach-certs
|
|
name: certs
|
|
initContainers:
|
|
- command:
|
|
- /bin/ash
|
|
- -ecx
|
|
- /request-cert
|
|
- -namespace=${POD_NAMESPACE}
|
|
- -certs-dir=/cockroach-certs
|
|
- -type=node
|
|
- -addresses=localhost,127.0.0.1,${POD_IP},$(hostname -f),$(hostname -f|cut
|
|
-f 1-2 -d '.'),dev-base-cockroachdb-public
|
|
- -symlink-ca-from=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
env:
|
|
- name: POD_IP
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: status.podIP
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
image: cockroachdb/cockroach-k8s-request-cert:0.2
|
|
imagePullPolicy: IfNotPresent
|
|
name: init-certs
|
|
volumeMounts:
|
|
- mountPath: /cockroach-certs
|
|
name: certs
|
|
serviceAccountName: dev-base-cockroachdb
|
|
terminationGracePeriodSeconds: 60
|
|
volumes:
|
|
- name: datadir
|
|
persistentVolumeClaim:
|
|
claimName: datadir
|
|
- emptyDir: {}
|
|
name: certs
|
|
updateStrategy:
|
|
type: RollingUpdate
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: datadir
|
|
spec:
|
|
accessModes:
|
|
- ReadWriteOnce
|
|
resources:
|
|
requests:
|
|
storage: 1Gi
|
|
---
|
|
apiVersion: batch/v1beta1
|
|
kind: CronJob
|
|
metadata:
|
|
name: dev-base-cronjob-example
|
|
spec:
|
|
concurrencyPolicy: Forbid
|
|
jobTemplate:
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- command:
|
|
- echo
|
|
- dev-base-cockroachdb
|
|
- dev-base-test-config-map-b2g2dmd64b
|
|
env:
|
|
- name: CDB_PUBLIC_SVC
|
|
value: dev-base-cockroachdb-public
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
name: cronjob-example
|
|
schedule: '*/1 * * * *'
|
|
---
|
|
apiVersion: policy/v1beta1
|
|
kind: PodDisruptionBudget
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb-budget
|
|
spec:
|
|
maxUnavailable: 1
|
|
selector:
|
|
matchLabels:
|
|
app: cockroachdb
|
|
`)
|
|
}
|
|
|
|
func TestVariableRefIngress(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/overlay")
|
|
th.WriteK("/app/base", `
|
|
resources:
|
|
- deployment.yaml
|
|
- ingress.yaml
|
|
- service.yaml
|
|
|
|
vars:
|
|
- name: DEPLOYMENT_NAME
|
|
objref:
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
name: nginx
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
`)
|
|
th.WriteF("/app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: nginx
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/component: nginx
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
containers:
|
|
- name: nginx
|
|
image: nginx:1.15.7-alpine
|
|
ports:
|
|
- name: http
|
|
containerPort: 80
|
|
`)
|
|
th.WriteF("/app/base/ingress.yaml", `
|
|
apiVersion: extensions/v1beta1
|
|
kind: Ingress
|
|
metadata:
|
|
name: nginx
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
rules:
|
|
- host: $(DEPLOYMENT_NAME).example.com
|
|
http:
|
|
paths:
|
|
- backend:
|
|
serviceName: nginx
|
|
servicePort: 80
|
|
path: /
|
|
tls:
|
|
- hosts:
|
|
- $(DEPLOYMENT_NAME).example.com
|
|
secretName: $(DEPLOYMENT_NAME).example.com-tls
|
|
`)
|
|
th.WriteF("/app/base/service.yaml", `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: nginx
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
ports:
|
|
- name: http
|
|
port: 80
|
|
protocol: TCP
|
|
targetPort: http
|
|
`)
|
|
th.WriteK("/app/overlay", `
|
|
nameprefix: kustomized-
|
|
bases:
|
|
- ../base
|
|
`)
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
name: kustomized-nginx
|
|
spec:
|
|
ports:
|
|
- name: http
|
|
port: 80
|
|
protocol: TCP
|
|
targetPort: http
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
name: kustomized-nginx
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/component: nginx
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
containers:
|
|
- image: nginx:1.15.7-alpine
|
|
name: nginx
|
|
ports:
|
|
- containerPort: 80
|
|
name: http
|
|
---
|
|
apiVersion: extensions/v1beta1
|
|
kind: Ingress
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
name: kustomized-nginx
|
|
spec:
|
|
rules:
|
|
- host: kustomized-nginx.example.com
|
|
http:
|
|
paths:
|
|
- backend:
|
|
serviceName: kustomized-nginx
|
|
servicePort: 80
|
|
path: /
|
|
tls:
|
|
- hosts:
|
|
- kustomized-nginx.example.com
|
|
secretName: kustomized-nginx.example.com-tls
|
|
`)
|
|
}
|
|
|
|
func TestVariableRefMountPath(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/base")
|
|
th.WriteK("/app/base", `
|
|
resources:
|
|
- deployment.yaml
|
|
- namespace.yaml
|
|
|
|
vars:
|
|
- name: NAMESPACE
|
|
objref:
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
name: my-namespace
|
|
|
|
`)
|
|
th.WriteF("/app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: my-deployment
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: app
|
|
image: busybox
|
|
volumeMounts:
|
|
- name: my-volume
|
|
mountPath: "/$(NAMESPACE)"
|
|
env:
|
|
- name: NAMESPACE
|
|
value: $(NAMESPACE)
|
|
volumes:
|
|
- name: my-volume
|
|
emptyDir: {}
|
|
`)
|
|
th.WriteF("/app/base/namespace.yaml", `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
`)
|
|
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: my-deployment
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- env:
|
|
- name: NAMESPACE
|
|
value: my-namespace
|
|
image: busybox
|
|
name: app
|
|
volumeMounts:
|
|
- mountPath: /my-namespace
|
|
name: my-volume
|
|
volumes:
|
|
- emptyDir: {}
|
|
name: my-volume
|
|
`)
|
|
}
|
|
|
|
func TestVariableRefMaps(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/base")
|
|
th.WriteK("/app/base", `
|
|
resources:
|
|
- deployment.yaml
|
|
- namespace.yaml
|
|
vars:
|
|
- name: NAMESPACE
|
|
objref:
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
name: my-namespace
|
|
`)
|
|
th.WriteF("/app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: my-deployment
|
|
labels:
|
|
my-label: $(NAMESPACE)
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: app
|
|
image: busybox
|
|
`)
|
|
th.WriteF("/app/base/namespace.yaml", `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
`)
|
|
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
labels:
|
|
my-label: my-namespace
|
|
name: my-deployment
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- image: busybox
|
|
name: app
|
|
`)
|
|
}
|
|
|
|
func TestVaribaleRefDifferentPrefix(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/base")
|
|
th.WriteK("/app/base", `
|
|
namePrefix: base-
|
|
bases:
|
|
- dev
|
|
- test
|
|
`)
|
|
|
|
th.WriteK("/app/base/dev", `
|
|
namePrefix: dev-
|
|
resources:
|
|
- elasticsearch-dev-service.yml
|
|
vars:
|
|
- name: elasticsearch-dev-service-name
|
|
objref:
|
|
kind: Service
|
|
name: elasticsearch
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
|
|
`)
|
|
th.WriteF("/app/base/dev/elasticsearch-dev-service.yml", `
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: elasticsearch
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: elasticsearch
|
|
env:
|
|
- name: DISCOVERY_SERVICE
|
|
value: "$(elasticsearch-dev-service-name).monitoring.svc.cluster.local"
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: elasticsearch
|
|
spec:
|
|
ports:
|
|
- name: transport
|
|
port: 9300
|
|
protocol: TCP
|
|
clusterIP: None
|
|
`)
|
|
|
|
th.WriteK("/app/base/test", `
|
|
namePrefix: test-
|
|
resources:
|
|
- elasticsearch-test-service.yml
|
|
vars:
|
|
- name: elasticsearch-test-service-name
|
|
objref:
|
|
kind: Service
|
|
name: elasticsearch
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
`)
|
|
th.WriteF("/app/base/test/elasticsearch-test-service.yml", `
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: elasticsearch
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: elasticsearch
|
|
env:
|
|
- name: DISCOVERY_SERVICE
|
|
value: "$(elasticsearch-test-service-name).monitoring.svc.cluster.local"
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: elasticsearch
|
|
spec:
|
|
ports:
|
|
- name: transport
|
|
port: 9300
|
|
protocol: TCP
|
|
clusterIP: None
|
|
`)
|
|
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: base-dev-elasticsearch
|
|
spec:
|
|
clusterIP: None
|
|
ports:
|
|
- name: transport
|
|
port: 9300
|
|
protocol: TCP
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: base-test-elasticsearch
|
|
spec:
|
|
clusterIP: None
|
|
ports:
|
|
- name: transport
|
|
port: 9300
|
|
protocol: TCP
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: base-dev-elasticsearch
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- env:
|
|
- name: DISCOVERY_SERVICE
|
|
value: base-dev-elasticsearch.monitoring.svc.cluster.local
|
|
name: elasticsearch
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: base-test-elasticsearch
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- env:
|
|
- name: DISCOVERY_SERVICE
|
|
value: base-test-elasticsearch.monitoring.svc.cluster.local
|
|
name: elasticsearch
|
|
`)
|
|
}
|