mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-13 11:34:26 +00:00
b2b53ae9e1
* feat: enable running ZITADEL offline * refactor: move operator image to common images * test: remove empty test
275 lines
9.6 KiB
Go
275 lines
9.6 KiB
Go
package managed
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"gopkg.in/yaml.v3"
|
|
|
|
"github.com/caos/orbos/mntr"
|
|
kubernetesmock "github.com/caos/orbos/pkg/kubernetes/mock"
|
|
"github.com/caos/orbos/pkg/labels"
|
|
"github.com/caos/orbos/pkg/secret"
|
|
"github.com/caos/orbos/pkg/tree"
|
|
coremock "github.com/caos/zitadel/operator/database/kinds/databases/core/mock"
|
|
"github.com/golang/mock/gomock"
|
|
"github.com/stretchr/testify/assert"
|
|
corev1 "k8s.io/api/core/v1"
|
|
policy "k8s.io/api/policy/v1beta1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
)
|
|
|
|
func getDesiredTree(t *testing.T, masterkey string, desired interface{}) *tree.Tree {
|
|
secret.Masterkey = masterkey
|
|
|
|
desiredTree := &tree.Tree{}
|
|
data, err := yaml.Marshal(desired)
|
|
assert.NoError(t, err)
|
|
assert.NoError(t, yaml.Unmarshal(data, desiredTree))
|
|
|
|
return desiredTree
|
|
}
|
|
|
|
func TestManaged_Adapt1(t *testing.T) {
|
|
monitor := mntr.Monitor{}
|
|
|
|
nodeLabels := map[string]string{
|
|
"app.kubernetes.io/component": "database",
|
|
"app.kubernetes.io/managed-by": "testOp",
|
|
"app.kubernetes.io/name": "cockroachdb.node",
|
|
"app.kubernetes.io/part-of": "testProd",
|
|
"orbos.ch/selectable": "yes",
|
|
}
|
|
|
|
cockroachLabels := map[string]string{
|
|
"app.kubernetes.io/component": "database",
|
|
"app.kubernetes.io/managed-by": "testOp",
|
|
"app.kubernetes.io/name": "cockroachdb-budget",
|
|
"app.kubernetes.io/part-of": "testProd",
|
|
"app.kubernetes.io/version": "testVersion",
|
|
"caos.ch/apiversion": "v0",
|
|
"caos.ch/kind": "testKind",
|
|
}
|
|
|
|
cockroachSelectorLabels := map[string]string{
|
|
"app.kubernetes.io/component": "database",
|
|
"app.kubernetes.io/managed-by": "testOp",
|
|
"app.kubernetes.io/name": "cockroachdb",
|
|
"app.kubernetes.io/part-of": "testProd",
|
|
"orbos.ch/selectable": "yes",
|
|
}
|
|
|
|
componentLabels := labels.MustForComponent(labels.MustForAPI(labels.MustForOperator("testProd", "testOp", "testVersion"), "testKind", "v0"), "database")
|
|
|
|
namespace := "testNs"
|
|
timestamp := "testTs"
|
|
nodeselector := map[string]string{"test": "test"}
|
|
tolerations := []corev1.Toleration{}
|
|
version := "testVersion"
|
|
features := []string{"database"}
|
|
masterkey := "testMk"
|
|
k8sClient := kubernetesmock.NewMockClientInt(gomock.NewController(t))
|
|
dbCurrent := coremock.NewMockDatabaseCurrent(gomock.NewController(t))
|
|
queried := map[string]interface{}{}
|
|
|
|
desired := getDesiredTree(t, masterkey, &DesiredV0{
|
|
Common: &tree.Common{
|
|
Kind: "databases.caos.ch/CockroachDB",
|
|
Version: "v0",
|
|
},
|
|
Spec: Spec{
|
|
Verbose: false,
|
|
ReplicaCount: 1,
|
|
StorageCapacity: "368Gi",
|
|
StorageClass: "testSC",
|
|
NodeSelector: map[string]string{},
|
|
ClusterDns: "testDns",
|
|
},
|
|
})
|
|
|
|
unav := intstr.FromInt(1)
|
|
k8sClient.EXPECT().ApplyPodDisruptionBudget(&policy.PodDisruptionBudget{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "cockroachdb-budget",
|
|
Namespace: namespace,
|
|
Labels: cockroachLabels,
|
|
},
|
|
Spec: policy.PodDisruptionBudgetSpec{
|
|
Selector: &metav1.LabelSelector{
|
|
MatchLabels: cockroachSelectorLabels,
|
|
},
|
|
MaxUnavailable: &unav,
|
|
},
|
|
})
|
|
secretList := &corev1.SecretList{
|
|
Items: []corev1.Secret{},
|
|
}
|
|
|
|
k8sClient.EXPECT().ApplyService(gomock.Any()).Times(3)
|
|
k8sClient.EXPECT().ApplyServiceAccount(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyRole(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyClusterRole(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyRoleBinding(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyClusterRoleBinding(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
//statefulset
|
|
k8sClient.EXPECT().ApplyStatefulSet(gomock.Any(), gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
//running for setup
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, false, 60*time.Second).MinTimes(1).MaxTimes(1)
|
|
//not ready for setup
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 1*time.Second).MinTimes(1).MaxTimes(1)
|
|
//ready after setup
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 60*time.Second).MinTimes(1).MaxTimes(1)
|
|
//client
|
|
k8sClient.EXPECT().ListSecrets(namespace, nodeLabels).MinTimes(1).MaxTimes(1).Return(secretList, nil)
|
|
dbCurrent.EXPECT().GetCertificate().MinTimes(1).MaxTimes(1).Return(nil)
|
|
dbCurrent.EXPECT().GetCertificateKey().MinTimes(1).MaxTimes(1).Return(nil)
|
|
k8sClient.EXPECT().ApplySecret(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
//node
|
|
k8sClient.EXPECT().ListSecrets(namespace, nodeLabels).MinTimes(1).MaxTimes(1).Return(secretList, nil)
|
|
dbCurrent.EXPECT().GetCertificate().MinTimes(1).MaxTimes(1).Return(nil)
|
|
dbCurrent.EXPECT().GetCertificateKey().MinTimes(1).MaxTimes(1).Return(nil)
|
|
dbCurrent.EXPECT().SetCertificate(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
dbCurrent.EXPECT().SetCertificateKey(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplySecret(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
|
|
query, _, _, _, _, _, err := Adapter(
|
|
componentLabels,
|
|
namespace,
|
|
timestamp,
|
|
nodeselector,
|
|
tolerations,
|
|
version,
|
|
features,
|
|
"",
|
|
)(monitor, desired, &tree.Tree{})
|
|
assert.NoError(t, err)
|
|
|
|
ensure, err := query(k8sClient, queried)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, ensure)
|
|
|
|
assert.NoError(t, ensure(k8sClient))
|
|
}
|
|
|
|
func TestManaged_Adapt2(t *testing.T) {
|
|
monitor := mntr.Monitor{}
|
|
namespace := "testNs"
|
|
timestamp := "testTs"
|
|
|
|
nodeLabels := map[string]string{
|
|
"app.kubernetes.io/component": "database2",
|
|
"app.kubernetes.io/managed-by": "testOp2",
|
|
"app.kubernetes.io/name": "cockroachdb.node",
|
|
"app.kubernetes.io/part-of": "testProd2",
|
|
"orbos.ch/selectable": "yes",
|
|
}
|
|
|
|
cockroachLabels := map[string]string{
|
|
"app.kubernetes.io/component": "database2",
|
|
"app.kubernetes.io/managed-by": "testOp2",
|
|
"app.kubernetes.io/name": "cockroachdb-budget",
|
|
"app.kubernetes.io/part-of": "testProd2",
|
|
"app.kubernetes.io/version": "testVersion2",
|
|
"caos.ch/apiversion": "v1",
|
|
"caos.ch/kind": "testKind2",
|
|
}
|
|
|
|
cockroachSelectorLabels := map[string]string{
|
|
"app.kubernetes.io/component": "database2",
|
|
"app.kubernetes.io/managed-by": "testOp2",
|
|
"app.kubernetes.io/name": "cockroachdb",
|
|
"app.kubernetes.io/part-of": "testProd2",
|
|
"orbos.ch/selectable": "yes",
|
|
}
|
|
|
|
componentLabels := labels.MustForComponent(labels.MustForAPI(labels.MustForOperator("testProd2", "testOp2", "testVersion2"), "testKind2", "v1"), "database2")
|
|
|
|
nodeselector := map[string]string{"test2": "test2"}
|
|
var tolerations []corev1.Toleration
|
|
version := "testVersion2"
|
|
features := []string{"database"}
|
|
masterkey := "testMk2"
|
|
k8sClient := kubernetesmock.NewMockClientInt(gomock.NewController(t))
|
|
dbCurrent := coremock.NewMockDatabaseCurrent(gomock.NewController(t))
|
|
queried := map[string]interface{}{}
|
|
|
|
desired := getDesiredTree(t, masterkey, &DesiredV0{
|
|
Common: &tree.Common{
|
|
Kind: "databases.caos.ch/CockroachDB",
|
|
Version: "v0",
|
|
},
|
|
Spec: Spec{
|
|
Verbose: false,
|
|
ReplicaCount: 1,
|
|
StorageCapacity: "368Gi",
|
|
StorageClass: "testSC",
|
|
NodeSelector: map[string]string{},
|
|
ClusterDns: "testDns",
|
|
},
|
|
})
|
|
|
|
unav := intstr.FromInt(1)
|
|
k8sClient.EXPECT().ApplyPodDisruptionBudget(&policy.PodDisruptionBudget{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "cockroachdb-budget",
|
|
Namespace: namespace,
|
|
Labels: cockroachLabels,
|
|
},
|
|
Spec: policy.PodDisruptionBudgetSpec{
|
|
Selector: &metav1.LabelSelector{
|
|
MatchLabels: cockroachSelectorLabels,
|
|
},
|
|
MaxUnavailable: &unav,
|
|
},
|
|
})
|
|
secretList := &corev1.SecretList{
|
|
Items: []corev1.Secret{},
|
|
}
|
|
|
|
k8sClient.EXPECT().ApplyService(gomock.Any()).Times(3)
|
|
k8sClient.EXPECT().ApplyServiceAccount(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyRole(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyClusterRole(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyRoleBinding(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplyClusterRoleBinding(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
//statefulset
|
|
k8sClient.EXPECT().ApplyStatefulSet(gomock.Any(), gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
//running for setup
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, false, 60*time.Second).MinTimes(1).MaxTimes(1)
|
|
//not ready for setup
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 1*time.Second).MinTimes(1).MaxTimes(1)
|
|
//ready after setup
|
|
k8sClient.EXPECT().WaitUntilStatefulsetIsReady(namespace, SfsName, true, true, 60*time.Second).MinTimes(1).MaxTimes(1)
|
|
//client
|
|
k8sClient.EXPECT().ListSecrets(namespace, nodeLabels).MinTimes(1).MaxTimes(1).Return(secretList, nil)
|
|
dbCurrent.EXPECT().GetCertificate().MinTimes(1).MaxTimes(1).Return(nil)
|
|
dbCurrent.EXPECT().GetCertificateKey().MinTimes(1).MaxTimes(1).Return(nil)
|
|
k8sClient.EXPECT().ApplySecret(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
//node
|
|
k8sClient.EXPECT().ListSecrets(namespace, nodeLabels).MinTimes(1).MaxTimes(1).Return(secretList, nil)
|
|
dbCurrent.EXPECT().GetCertificate().MinTimes(1).MaxTimes(1).Return(nil)
|
|
dbCurrent.EXPECT().GetCertificateKey().MinTimes(1).MaxTimes(1).Return(nil)
|
|
dbCurrent.EXPECT().SetCertificate(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
dbCurrent.EXPECT().SetCertificateKey(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
k8sClient.EXPECT().ApplySecret(gomock.Any()).MinTimes(1).MaxTimes(1)
|
|
|
|
query, _, _, _, _, _, err := Adapter(
|
|
componentLabels,
|
|
namespace,
|
|
timestamp,
|
|
nodeselector,
|
|
tolerations,
|
|
version,
|
|
features,
|
|
"",
|
|
)(monitor, desired, &tree.Tree{})
|
|
assert.NoError(t, err)
|
|
|
|
ensure, err := query(k8sClient, queried)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, ensure)
|
|
|
|
assert.NoError(t, ensure(k8sClient))
|
|
}
|