mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-20 23:07:33 +00:00
425a8b5fd5
* fix(zitadelctl): implement takedown command * fix(zitadelctl): correct destroy flow * fix(zitadelctl): correct backup commands to read crds beforehand * fix: add of destroyfile * fix: clean for userlist * fix: change backup and restore to crdb native * fix: timeout for delete pvc for cockroachdb * fix: corrected unit tests * fix: add ignored file for scale * fix: correct handling of gitops in backup command * feat: add s3 backup kind * fix: backuplist for s3 and timeout for pv deletion * fix(database): fix nil pointer with binary version * fix(database): cleanup of errors which cam with merging of the s3 logic * fix: correct unit tests * fix: cleanup monitor output Co-authored-by: Elio Bischof <eliobischof@gmail.com> * fix: backup imagepullpolixy to ifnotpresent Co-authored-by: Elio Bischof <eliobischof@gmail.com>
200 lines
4.9 KiB
Go
200 lines
4.9 KiB
Go
package backup
|
|
|
|
import (
|
|
"github.com/caos/zitadel/operator/common"
|
|
"github.com/caos/zitadel/operator/helpers"
|
|
"github.com/stretchr/testify/assert"
|
|
batchv1 "k8s.io/api/batch/v1"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"testing"
|
|
)
|
|
|
|
func TestBackup_JobSpec1(t *testing.T) {
|
|
nodeselector := map[string]string{"test": "test"}
|
|
tolerations := []corev1.Toleration{
|
|
{Key: "testKey", Operator: "testOp"}}
|
|
backupName := "testName"
|
|
version := "testVersion"
|
|
command := "test"
|
|
accessKeyIDName := "testAKIN"
|
|
accessKeyIDKey := "testAKIK"
|
|
secretAccessKeyName := "testSAKN"
|
|
secretAccessKeyKey := "testSAKK"
|
|
sessionTokenName := "testSTN"
|
|
sessionTokenKey := "testSTK"
|
|
|
|
equals := batchv1.JobSpec{
|
|
Template: corev1.PodTemplateSpec{
|
|
Spec: corev1.PodSpec{
|
|
RestartPolicy: corev1.RestartPolicyNever,
|
|
NodeSelector: nodeselector,
|
|
Tolerations: tolerations,
|
|
Containers: []corev1.Container{{
|
|
Name: backupName,
|
|
Image: common.BackupImage.Reference("", version),
|
|
Command: []string{
|
|
"/bin/bash",
|
|
"-c",
|
|
command,
|
|
},
|
|
VolumeMounts: []corev1.VolumeMount{{
|
|
Name: internalSecretName,
|
|
MountPath: certPath,
|
|
}, {
|
|
Name: accessKeyIDKey,
|
|
SubPath: accessKeyIDKey,
|
|
MountPath: accessKeyIDPath,
|
|
}, {
|
|
Name: secretAccessKeyKey,
|
|
SubPath: secretAccessKeyKey,
|
|
MountPath: secretAccessKeyPath,
|
|
}, {
|
|
Name: sessionTokenKey,
|
|
SubPath: sessionTokenKey,
|
|
MountPath: sessionTokenPath,
|
|
}},
|
|
ImagePullPolicy: corev1.PullIfNotPresent,
|
|
}},
|
|
Volumes: []corev1.Volume{{
|
|
Name: internalSecretName,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: rootSecretName,
|
|
DefaultMode: helpers.PointerInt32(defaultMode),
|
|
},
|
|
},
|
|
}, {
|
|
Name: accessKeyIDKey,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: accessKeyIDName,
|
|
},
|
|
},
|
|
}, {
|
|
Name: secretAccessKeyKey,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: secretAccessKeyName,
|
|
},
|
|
},
|
|
}, {
|
|
Name: sessionTokenKey,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: sessionTokenName,
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
|
|
assert.Equal(t, equals, getJobSpecDef(
|
|
nodeselector,
|
|
tolerations,
|
|
accessKeyIDName,
|
|
accessKeyIDKey,
|
|
secretAccessKeyName,
|
|
secretAccessKeyKey,
|
|
sessionTokenName,
|
|
sessionTokenKey,
|
|
backupName,
|
|
common.BackupImage.Reference("", version),
|
|
command))
|
|
}
|
|
|
|
func TestBackup_JobSpec2(t *testing.T) {
|
|
nodeselector := map[string]string{"test2": "test2"}
|
|
tolerations := []corev1.Toleration{
|
|
{Key: "testKey2", Operator: "testOp2"}}
|
|
backupName := "testName2"
|
|
version := "testVersion2"
|
|
command := "test2"
|
|
accessKeyIDName := "testAKIN2"
|
|
accessKeyIDKey := "testAKIK2"
|
|
secretAccessKeyName := "testSAKN2"
|
|
secretAccessKeyKey := "testSAKK2"
|
|
sessionTokenName := "testSTN2"
|
|
sessionTokenKey := "testSTK2"
|
|
|
|
equals := batchv1.JobSpec{
|
|
Template: corev1.PodTemplateSpec{
|
|
Spec: corev1.PodSpec{
|
|
RestartPolicy: corev1.RestartPolicyNever,
|
|
NodeSelector: nodeselector,
|
|
Tolerations: tolerations,
|
|
Containers: []corev1.Container{{
|
|
Name: backupName,
|
|
Image: common.BackupImage.Reference("", version),
|
|
Command: []string{
|
|
"/bin/bash",
|
|
"-c",
|
|
command,
|
|
},
|
|
VolumeMounts: []corev1.VolumeMount{{
|
|
Name: internalSecretName,
|
|
MountPath: certPath,
|
|
}, {
|
|
Name: accessKeyIDKey,
|
|
SubPath: accessKeyIDKey,
|
|
MountPath: accessKeyIDPath,
|
|
}, {
|
|
Name: secretAccessKeyKey,
|
|
SubPath: secretAccessKeyKey,
|
|
MountPath: secretAccessKeyPath,
|
|
}, {
|
|
Name: sessionTokenKey,
|
|
SubPath: sessionTokenKey,
|
|
MountPath: sessionTokenPath,
|
|
}},
|
|
ImagePullPolicy: corev1.PullIfNotPresent,
|
|
}},
|
|
Volumes: []corev1.Volume{{
|
|
Name: internalSecretName,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: rootSecretName,
|
|
DefaultMode: helpers.PointerInt32(defaultMode),
|
|
},
|
|
},
|
|
}, {
|
|
Name: accessKeyIDKey,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: accessKeyIDName,
|
|
},
|
|
},
|
|
}, {
|
|
Name: secretAccessKeyKey,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: secretAccessKeyName,
|
|
},
|
|
},
|
|
}, {
|
|
Name: sessionTokenKey,
|
|
VolumeSource: corev1.VolumeSource{
|
|
Secret: &corev1.SecretVolumeSource{
|
|
SecretName: sessionTokenName,
|
|
},
|
|
},
|
|
}},
|
|
},
|
|
},
|
|
}
|
|
|
|
assert.Equal(t, equals, getJobSpecDef(
|
|
nodeselector,
|
|
tolerations,
|
|
accessKeyIDName,
|
|
accessKeyIDKey,
|
|
secretAccessKeyName,
|
|
secretAccessKeyKey,
|
|
sessionTokenName,
|
|
sessionTokenKey,
|
|
backupName,
|
|
common.BackupImage.Reference("", version),
|
|
command,
|
|
))
|
|
}
|