mirror of
https://github.com/kubernetes-sigs/kustomize.git
synced 2026-05-17 18:25:26 +00:00
856 lines
19 KiB
Go
856 lines
19 KiB
Go
/*
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package target_test
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"sigs.k8s.io/kustomize/pkg/kusttest"
|
|
)
|
|
|
|
func TestVariableRef(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/overlay/staging")
|
|
th.WriteK("/app/base", `
|
|
namePrefix: base-
|
|
resources:
|
|
- cockroachdb-statefulset-secure.yaml
|
|
- cronjob.yaml
|
|
configMapGenerator:
|
|
- name: test-config-map
|
|
literals:
|
|
- foo=bar
|
|
- baz=qux
|
|
vars:
|
|
- name: CDB_PUBLIC_SVC
|
|
objref:
|
|
kind: Service
|
|
name: cockroachdb-public
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
- name: CDB_STATEFULSET_NAME
|
|
objref:
|
|
kind: StatefulSet
|
|
name: cockroachdb
|
|
apiVersion: apps/v1beta1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
- name: CDB_STATEFULSET_SVC
|
|
objref:
|
|
kind: Service
|
|
name: cockroachdb
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
|
|
- name: TEST_CONFIG_MAP
|
|
objref:
|
|
kind: ConfigMap
|
|
name: test-config-map
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: metadata.name`)
|
|
th.WriteF("/app/base/cronjob.yaml", `
|
|
apiVersion: batch/v1beta1
|
|
kind: CronJob
|
|
metadata:
|
|
name: cronjob-example
|
|
spec:
|
|
schedule: "*/1 * * * *"
|
|
concurrencyPolicy: Forbid
|
|
jobTemplate:
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: cronjob-example
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
command:
|
|
- echo
|
|
- "$(CDB_STATEFULSET_NAME)"
|
|
- "$(TEST_CONFIG_MAP)"
|
|
env:
|
|
- name: CDB_PUBLIC_SVC
|
|
value: "$(CDB_PUBLIC_SVC)"
|
|
`)
|
|
th.WriteF("/app/base/cockroachdb-statefulset-secure.yaml", `
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: Role
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- secrets
|
|
verbs:
|
|
- create
|
|
- get
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- certificates.k8s.io
|
|
resources:
|
|
- certificatesigningrequests
|
|
verbs:
|
|
- create
|
|
- get
|
|
- watch
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: RoleBinding
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
# This service is meant to be used by clients of the database. It exposes a ClusterIP that will
|
|
# automatically load balance connections to the different database pods.
|
|
name: cockroachdb-public
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
ports:
|
|
# The main port, served by gRPC, serves Postgres-flavor SQL, internode
|
|
# traffic and the cli.
|
|
- port: 26257
|
|
targetPort: 26257
|
|
name: grpc
|
|
# The secondary port serves the UI as well as health and debug endpoints.
|
|
- port: 8080
|
|
targetPort: 8080
|
|
name: http
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: cockroachdb
|
|
labels:
|
|
app: cockroachdb
|
|
annotations:
|
|
service.alpha.kubernetes.io/tolerate-unready-endpoints: "true"
|
|
# Enable automatic monitoring of all instances when Prometheus is running in the cluster.
|
|
prometheus.io/scrape: "true"
|
|
prometheus.io/path: "_status/vars"
|
|
prometheus.io/port: "8080"
|
|
spec:
|
|
ports:
|
|
- port: 26257
|
|
targetPort: 26257
|
|
name: grpc
|
|
- port: 8080
|
|
targetPort: 8080
|
|
name: http
|
|
clusterIP: None
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: policy/v1beta1
|
|
kind: PodDisruptionBudget
|
|
metadata:
|
|
name: cockroachdb-budget
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app: cockroachdb
|
|
maxUnavailable: 1
|
|
---
|
|
apiVersion: apps/v1beta1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: cockroachdb
|
|
spec:
|
|
serviceName: "cockroachdb"
|
|
replicas: 3
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
serviceAccountName: cockroachdb
|
|
# Init containers are run only once in the lifetime of a pod, before
|
|
# it's started up for the first time. It has to exit successfully
|
|
# before the pod's main containers are allowed to start.
|
|
initContainers:
|
|
# The init-certs container sends a certificate signing request to the
|
|
# kubernetes cluster.
|
|
# You can see pending requests using: kubectl get csr
|
|
# CSRs can be approved using: kubectl certificate approve <csr name>
|
|
#
|
|
# All addresses used to contact a node must be specified in the --addresses arg.
|
|
#
|
|
# In addition to the node certificate and key, the init-certs entrypoint will symlink
|
|
# the cluster CA to the certs directory.
|
|
- name: init-certs
|
|
image: cockroachdb/cockroach-k8s-request-cert:0.2
|
|
imagePullPolicy: IfNotPresent
|
|
command:
|
|
- "/bin/ash"
|
|
- "-ecx"
|
|
- "/request-cert"
|
|
- -namespace=${POD_NAMESPACE}
|
|
- -certs-dir=/cockroach-certs
|
|
- -type=node
|
|
- -addresses=localhost,127.0.0.1,${POD_IP},$(hostname -f),$(hostname -f|cut -f 1-2 -d '.'),$(CDB_PUBLIC_SVC)
|
|
- -symlink-ca-from=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
env:
|
|
- name: POD_IP
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: status.podIP
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
volumeMounts:
|
|
- name: certs
|
|
mountPath: /cockroach-certs
|
|
|
|
affinity:
|
|
podAntiAffinity:
|
|
preferredDuringSchedulingIgnoredDuringExecution:
|
|
- weight: 100
|
|
podAffinityTerm:
|
|
labelSelector:
|
|
matchExpressions:
|
|
- key: app
|
|
operator: In
|
|
values:
|
|
- cockroachdb
|
|
topologyKey: kubernetes.io/hostname
|
|
containers:
|
|
- name: cockroachdb
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
imagePullPolicy: IfNotPresent
|
|
ports:
|
|
- containerPort: 26257
|
|
name: grpc
|
|
- containerPort: 8080
|
|
name: http
|
|
volumeMounts:
|
|
- name: datadir
|
|
mountPath: /cockroach/cockroach-data
|
|
- name: certs
|
|
mountPath: /cockroach/cockroach-certs
|
|
command:
|
|
- "/bin/bash"
|
|
- "-ecx"
|
|
- "exec /cockroach/cockroach start --logtostderr"
|
|
- --certs-dir /cockroach/cockroach-certs
|
|
- --host $(hostname -f)
|
|
- --http-host 0.0.0.0
|
|
- --join $(CDB_STATEFULSET_NAME)-0.$(CDB_STATEFULSET_SVC),$(CDB_STATEFULSET_NAME)-1.$(CDB_STATEFULSET_SVC),$(CDB_STATEFULSET_NAME)-2.$(CDB_STATEFULSET_SVC)
|
|
- --cache 25%
|
|
- --max-sql-memory 25%
|
|
# No pre-stop hook is required, a SIGTERM plus some time is all that's
|
|
# needed for graceful shutdown of a node.
|
|
terminationGracePeriodSeconds: 60
|
|
volumes:
|
|
- name: datadir
|
|
persistentVolumeClaim:
|
|
claimName: datadir
|
|
- name: certs
|
|
emptyDir: {}
|
|
updateStrategy:
|
|
type: RollingUpdate
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: datadir
|
|
spec:
|
|
accessModes:
|
|
- "ReadWriteOnce"
|
|
resources:
|
|
requests:
|
|
storage: 1Gi
|
|
`)
|
|
th.WriteK("/app/overlay/staging", `
|
|
namePrefix: dev-
|
|
bases:
|
|
- ../../base
|
|
`)
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: Role
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- ""
|
|
resources:
|
|
- secrets
|
|
verbs:
|
|
- create
|
|
- get
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRole
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
rules:
|
|
- apiGroups:
|
|
- certificates.k8s.io
|
|
resources:
|
|
- certificatesigningrequests
|
|
verbs:
|
|
- create
|
|
- get
|
|
- watch
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: RoleBinding
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: Role
|
|
name: dev-base-cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: dev-base-cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: dev-base-cockroachdb
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: dev-base-cockroachdb
|
|
namespace: default
|
|
---
|
|
apiVersion: v1
|
|
data:
|
|
baz: qux
|
|
foo: bar
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: dev-base-test-config-map-b2g2dmd64b
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb-public
|
|
spec:
|
|
ports:
|
|
- name: grpc
|
|
port: 26257
|
|
targetPort: 26257
|
|
- name: http
|
|
port: 8080
|
|
targetPort: 8080
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
annotations:
|
|
prometheus.io/path: _status/vars
|
|
prometheus.io/port: "8080"
|
|
prometheus.io/scrape: "true"
|
|
service.alpha.kubernetes.io/tolerate-unready-endpoints: "true"
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb
|
|
spec:
|
|
clusterIP: None
|
|
ports:
|
|
- name: grpc
|
|
port: 26257
|
|
targetPort: 26257
|
|
- name: http
|
|
port: 8080
|
|
targetPort: 8080
|
|
selector:
|
|
app: cockroachdb
|
|
---
|
|
apiVersion: apps/v1beta1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: dev-base-cockroachdb
|
|
spec:
|
|
replicas: 3
|
|
serviceName: dev-base-cockroachdb
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
spec:
|
|
affinity:
|
|
podAntiAffinity:
|
|
preferredDuringSchedulingIgnoredDuringExecution:
|
|
- podAffinityTerm:
|
|
labelSelector:
|
|
matchExpressions:
|
|
- key: app
|
|
operator: In
|
|
values:
|
|
- cockroachdb
|
|
topologyKey: kubernetes.io/hostname
|
|
weight: 100
|
|
containers:
|
|
- command:
|
|
- /bin/bash
|
|
- -ecx
|
|
- exec /cockroach/cockroach start --logtostderr
|
|
- --certs-dir /cockroach/cockroach-certs
|
|
- --host $(hostname -f)
|
|
- --http-host 0.0.0.0
|
|
- --join dev-base-cockroachdb-0.dev-base-cockroachdb,dev-base-cockroachdb-1.dev-base-cockroachdb,dev-base-cockroachdb-2.dev-base-cockroachdb
|
|
- --cache 25%
|
|
- --max-sql-memory 25%
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
imagePullPolicy: IfNotPresent
|
|
name: cockroachdb
|
|
ports:
|
|
- containerPort: 26257
|
|
name: grpc
|
|
- containerPort: 8080
|
|
name: http
|
|
volumeMounts:
|
|
- mountPath: /cockroach/cockroach-data
|
|
name: datadir
|
|
- mountPath: /cockroach/cockroach-certs
|
|
name: certs
|
|
initContainers:
|
|
- command:
|
|
- /bin/ash
|
|
- -ecx
|
|
- /request-cert
|
|
- -namespace=${POD_NAMESPACE}
|
|
- -certs-dir=/cockroach-certs
|
|
- -type=node
|
|
- -addresses=localhost,127.0.0.1,${POD_IP},$(hostname -f),$(hostname -f|cut
|
|
-f 1-2 -d '.'),dev-base-cockroachdb-public
|
|
- -symlink-ca-from=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
|
|
env:
|
|
- name: POD_IP
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: status.podIP
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.namespace
|
|
image: cockroachdb/cockroach-k8s-request-cert:0.2
|
|
imagePullPolicy: IfNotPresent
|
|
name: init-certs
|
|
volumeMounts:
|
|
- mountPath: /cockroach-certs
|
|
name: certs
|
|
serviceAccountName: dev-base-cockroachdb
|
|
terminationGracePeriodSeconds: 60
|
|
volumes:
|
|
- name: datadir
|
|
persistentVolumeClaim:
|
|
claimName: datadir
|
|
- emptyDir: {}
|
|
name: certs
|
|
updateStrategy:
|
|
type: RollingUpdate
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: datadir
|
|
spec:
|
|
accessModes:
|
|
- ReadWriteOnce
|
|
resources:
|
|
requests:
|
|
storage: 1Gi
|
|
---
|
|
apiVersion: batch/v1beta1
|
|
kind: CronJob
|
|
metadata:
|
|
name: dev-base-cronjob-example
|
|
spec:
|
|
concurrencyPolicy: Forbid
|
|
jobTemplate:
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- command:
|
|
- echo
|
|
- dev-base-cockroachdb
|
|
- dev-base-test-config-map-b2g2dmd64b
|
|
env:
|
|
- name: CDB_PUBLIC_SVC
|
|
value: dev-base-cockroachdb-public
|
|
image: cockroachdb/cockroach:v1.1.5
|
|
name: cronjob-example
|
|
schedule: '*/1 * * * *'
|
|
---
|
|
apiVersion: policy/v1beta1
|
|
kind: PodDisruptionBudget
|
|
metadata:
|
|
labels:
|
|
app: cockroachdb
|
|
name: dev-base-cockroachdb-budget
|
|
spec:
|
|
maxUnavailable: 1
|
|
selector:
|
|
matchLabels:
|
|
app: cockroachdb
|
|
`)
|
|
}
|
|
|
|
func TestVariableRefIngress(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/overlay")
|
|
th.WriteK("/app/base", `
|
|
resources:
|
|
- deployment.yaml
|
|
- ingress.yaml
|
|
- service.yaml
|
|
|
|
vars:
|
|
- name: DEPLOYMENT_NAME
|
|
objref:
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
name: nginx
|
|
fieldref:
|
|
fieldpath: metadata.name
|
|
`)
|
|
th.WriteF("/app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: nginx
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/component: nginx
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
containers:
|
|
- name: nginx
|
|
image: nginx:1.15.7-alpine
|
|
ports:
|
|
- name: http
|
|
containerPort: 80
|
|
`)
|
|
th.WriteF("/app/base/ingress.yaml", `
|
|
apiVersion: extensions/v1beta1
|
|
kind: Ingress
|
|
metadata:
|
|
name: nginx
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
rules:
|
|
- host: $(DEPLOYMENT_NAME).example.com
|
|
http:
|
|
paths:
|
|
- backend:
|
|
serviceName: nginx
|
|
servicePort: 80
|
|
path: /
|
|
tls:
|
|
- hosts:
|
|
- $(DEPLOYMENT_NAME).example.com
|
|
secretName: $(DEPLOYMENT_NAME).example.com-tls
|
|
`)
|
|
th.WriteF("/app/base/service.yaml", `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: nginx
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
ports:
|
|
- name: http
|
|
port: 80
|
|
protocol: TCP
|
|
targetPort: http
|
|
`)
|
|
th.WriteK("/app/overlay", `
|
|
nameprefix: kustomized-
|
|
bases:
|
|
- ../base
|
|
`)
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
name: kustomized-nginx
|
|
spec:
|
|
ports:
|
|
- name: http
|
|
port: 80
|
|
protocol: TCP
|
|
targetPort: http
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
name: kustomized-nginx
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/component: nginx
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
spec:
|
|
containers:
|
|
- image: nginx:1.15.7-alpine
|
|
name: nginx
|
|
ports:
|
|
- containerPort: 80
|
|
name: http
|
|
---
|
|
apiVersion: extensions/v1beta1
|
|
kind: Ingress
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/component: nginx
|
|
name: kustomized-nginx
|
|
spec:
|
|
rules:
|
|
- host: kustomized-nginx.example.com
|
|
http:
|
|
paths:
|
|
- backend:
|
|
serviceName: kustomized-nginx
|
|
servicePort: 80
|
|
path: /
|
|
tls:
|
|
- hosts:
|
|
- kustomized-nginx.example.com
|
|
secretName: kustomized-nginx.example.com-tls
|
|
`)
|
|
}
|
|
|
|
func TestVariableRefMounthPath(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/base")
|
|
th.WriteK("/app/base", `
|
|
resources:
|
|
- deployment.yaml
|
|
- namespace.yaml
|
|
|
|
vars:
|
|
- name: NAMESPACE
|
|
objref:
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
name: my-namespace
|
|
|
|
`)
|
|
th.WriteF("/app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: my-deployment
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: app
|
|
image: busybox
|
|
volumeMounts:
|
|
- name: my-volume
|
|
mountPath: "/$(NAMESPACE)"
|
|
env:
|
|
- name: NAMESPACE
|
|
value: $(NAMESPACE)
|
|
volumes:
|
|
- name: my-volume
|
|
emptyDir: {}
|
|
`)
|
|
th.WriteF("/app/base/namespace.yaml", `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
`)
|
|
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: my-deployment
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- env:
|
|
- name: NAMESPACE
|
|
value: my-namespace
|
|
image: busybox
|
|
name: app
|
|
volumeMounts:
|
|
- mountPath: /my-namespace
|
|
name: my-volume
|
|
volumes:
|
|
- emptyDir: {}
|
|
name: my-volume
|
|
`)
|
|
}
|
|
|
|
func TestVariableRefMaps(t *testing.T) {
|
|
th := kusttest_test.NewKustTestHarness(t, "/app/base")
|
|
th.WriteK("/app/base", `
|
|
resources:
|
|
- deployment.yaml
|
|
- namespace.yaml
|
|
vars:
|
|
- name: NAMESPACE
|
|
objref:
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
name: my-namespace
|
|
`)
|
|
th.WriteF("/app/base/deployment.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: my-deployment
|
|
labels:
|
|
my-label: $(NAMESPACE)
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: app
|
|
image: busybox
|
|
`)
|
|
th.WriteF("/app/base/namespace.yaml", `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
`)
|
|
|
|
m, err := th.MakeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.AssertActualEqualsExpected(m, `
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: my-namespace
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
labels:
|
|
my-label: my-namespace
|
|
name: my-deployment
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- image: busybox
|
|
name: app
|
|
`)
|
|
}
|