mirror of
https://github.com/kubernetes-sigs/kustomize.git
synced 2026-05-17 18:25:26 +00:00
140 lines
3.1 KiB
Go
140 lines
3.1 KiB
Go
// Copyright 2019 The Kubernetes Authors.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package configmapandsecret
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"sigs.k8s.io/kustomize/pkg/fs"
|
|
"sigs.k8s.io/kustomize/pkg/loader"
|
|
"sigs.k8s.io/kustomize/pkg/types"
|
|
)
|
|
|
|
func makeEnvSecret(name string) *corev1.Secret {
|
|
return &corev1.Secret{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "v1",
|
|
Kind: "Secret",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: name,
|
|
},
|
|
Data: map[string][]byte{
|
|
"DB_PASSWORD": []byte("somepw"),
|
|
"DB_USERNAME": []byte("admin"),
|
|
},
|
|
Type: "Opaque",
|
|
}
|
|
}
|
|
|
|
func makeFileSecret(name string) *corev1.Secret {
|
|
return &corev1.Secret{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "v1",
|
|
Kind: "Secret",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: name,
|
|
},
|
|
Data: map[string][]byte{
|
|
"app-init.ini": []byte(`FOO=bar
|
|
BAR=baz
|
|
`),
|
|
},
|
|
Type: "Opaque",
|
|
}
|
|
}
|
|
|
|
func makeLiteralSecret(name string) *corev1.Secret {
|
|
s := &corev1.Secret{
|
|
TypeMeta: metav1.TypeMeta{
|
|
APIVersion: "v1",
|
|
Kind: "Secret",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: name,
|
|
},
|
|
Data: map[string][]byte{
|
|
"a": []byte("x"),
|
|
"b": []byte("y"),
|
|
},
|
|
Type: "Opaque",
|
|
}
|
|
s.SetLabels(map[string]string{"foo": "bar"})
|
|
return s
|
|
}
|
|
|
|
func TestConstructSecret(t *testing.T) {
|
|
type testCase struct {
|
|
description string
|
|
input types.SecretArgs
|
|
options *types.GeneratorOptions
|
|
expected *corev1.Secret
|
|
}
|
|
|
|
testCases := []testCase{
|
|
{
|
|
description: "construct secret from env",
|
|
input: types.SecretArgs{
|
|
GeneratorArgs: types.GeneratorArgs{
|
|
Name: "envSecret",
|
|
DataSources: types.DataSources{
|
|
EnvSources: []string{"secret/app.env"},
|
|
},
|
|
},
|
|
},
|
|
options: nil,
|
|
expected: makeEnvSecret("envSecret"),
|
|
},
|
|
{
|
|
description: "construct secret from file",
|
|
input: types.SecretArgs{
|
|
GeneratorArgs: types.GeneratorArgs{
|
|
Name: "fileSecret",
|
|
DataSources: types.DataSources{
|
|
FileSources: []string{"secret/app-init.ini"},
|
|
},
|
|
},
|
|
},
|
|
options: nil,
|
|
expected: makeFileSecret("fileSecret"),
|
|
},
|
|
{
|
|
description: "construct secret from literal",
|
|
input: types.SecretArgs{
|
|
GeneratorArgs: types.GeneratorArgs{
|
|
Name: "literalSecret",
|
|
DataSources: types.DataSources{
|
|
LiteralSources: []string{"a=x", "b=y"},
|
|
},
|
|
},
|
|
},
|
|
options: &types.GeneratorOptions{
|
|
Labels: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
expected: makeLiteralSecret("literalSecret"),
|
|
},
|
|
}
|
|
|
|
fSys := fs.MakeFakeFS()
|
|
fSys.WriteFile("/secret/app.env", []byte("DB_USERNAME=admin\nDB_PASSWORD=somepw\n"))
|
|
fSys.WriteFile("/secret/app-init.ini", []byte("FOO=bar\nBAR=baz\n"))
|
|
ldr := loader.NewFileLoaderAtRoot(fSys)
|
|
for _, tc := range testCases {
|
|
f := NewFactory(ldr, tc.options)
|
|
cm, err := f.MakeSecret(&tc.input)
|
|
if err != nil {
|
|
t.Fatalf("unexpected error: %v", err)
|
|
}
|
|
if !reflect.DeepEqual(*cm, *tc.expected) {
|
|
t.Fatalf("in testcase: %q updated:\n%#v\ndoesn't match expected:\n%#v\n", tc.description, *cm, tc.expected)
|
|
}
|
|
}
|
|
}
|