214 lines
5.3 KiB
Go
214 lines
5.3 KiB
Go
package tests_test
|
|
|
|
import (
|
|
"sigs.k8s.io/kustomize/v3/k8sdeps/kunstruct"
|
|
"sigs.k8s.io/kustomize/v3/k8sdeps/transformer"
|
|
"sigs.k8s.io/kustomize/v3/pkg/fs"
|
|
"sigs.k8s.io/kustomize/v3/pkg/loader"
|
|
"sigs.k8s.io/kustomize/v3/pkg/plugins"
|
|
"sigs.k8s.io/kustomize/v3/pkg/resmap"
|
|
"sigs.k8s.io/kustomize/v3/pkg/resource"
|
|
"sigs.k8s.io/kustomize/v3/pkg/target"
|
|
"sigs.k8s.io/kustomize/v3/pkg/validators"
|
|
"testing"
|
|
)
|
|
|
|
func writeApplicationOverlaysApplication(th *KustTestHarness) {
|
|
th.writeF("/manifests/application/application/overlays/application/application.yaml", `
|
|
apiVersion: app.k8s.io/v1beta1
|
|
kind: Application
|
|
metadata:
|
|
name: kubeflow
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/managed-by: kfctl
|
|
app.kubernetes.io/part-of: kubeflow
|
|
app.kubernetes.io/version: v0.6
|
|
componentKinds:
|
|
- group: app.k8s.io
|
|
kind: Application
|
|
descriptor:
|
|
type: kubeflow
|
|
version: v1beta1
|
|
description: application that aggregates all kubeflow applications
|
|
maintainers:
|
|
- name: Jeremy Lewi
|
|
email: jlewi@google.com
|
|
- name: Kam Kasravi
|
|
email: kam.d.kasravi@intel.com
|
|
owners:
|
|
- name: Jeremy Lewi
|
|
email: jlewi@google.com
|
|
keywords:
|
|
- kubeflow
|
|
links:
|
|
- description: About
|
|
url: "https://kubeflow.org"
|
|
addOwnerRef: true
|
|
`)
|
|
th.writeK("/manifests/application/application/overlays/application", `
|
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
kind: Kustomization
|
|
bases:
|
|
- ../../base
|
|
resources:
|
|
- application.yaml
|
|
commonLabels:
|
|
app.kubernetes.io/name: kubeflow
|
|
app.kubernetes.io/instance: kubeflow
|
|
app.kubernetes.io/managed-by: kfctl
|
|
app.kubernetes.io/component: kubeflow
|
|
app.kubernetes.io/part-of: kubeflow
|
|
app.kubernetes.io/version: v0.6
|
|
`)
|
|
th.writeF("/manifests/application/application/base/cluster-role.yaml", `
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRole
|
|
metadata:
|
|
name: cluster-role
|
|
rules:
|
|
- apiGroups:
|
|
- '*'
|
|
resources:
|
|
- '*'
|
|
verbs:
|
|
- get
|
|
- list
|
|
- update
|
|
- patch
|
|
- watch
|
|
- apiGroups:
|
|
- app.k8s.io
|
|
resources:
|
|
- '*'
|
|
verbs:
|
|
- '*'
|
|
`)
|
|
th.writeF("/manifests/application/application/base/cluster-role-binding.yaml", `
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
kind: ClusterRoleBinding
|
|
metadata:
|
|
name: cluster-role-binding
|
|
roleRef:
|
|
apiGroup: rbac.authorization.k8s.io
|
|
kind: ClusterRole
|
|
name: cluster-role
|
|
subjects:
|
|
- kind: ServiceAccount
|
|
name: service-account
|
|
`)
|
|
th.writeF("/manifests/application/application/base/service-account.yaml", `
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: service-account
|
|
`)
|
|
th.writeF("/manifests/application/application/base/service.yaml", `
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: service
|
|
spec:
|
|
ports:
|
|
- port: 443
|
|
`)
|
|
th.writeF("/manifests/application/application/base/stateful-set.yaml", `
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: stateful-set
|
|
spec:
|
|
serviceName: service
|
|
selector:
|
|
matchLabels:
|
|
app: application-controller
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: application-controller
|
|
spec:
|
|
containers:
|
|
- name: manager
|
|
command:
|
|
- /root/manager
|
|
image: gcr.io/kubeflow-images-public/kubernetes-sigs/application
|
|
imagePullPolicy: Always
|
|
env:
|
|
- name: project
|
|
value: $(project)
|
|
serviceAccountName: service-account
|
|
volumeClaimTemplates: []
|
|
`)
|
|
th.writeF("/manifests/application/application/base/params.yaml", `
|
|
varReference:
|
|
- path: spec/template/spec/containers/image
|
|
kind: StatefulSet
|
|
`)
|
|
th.writeF("/manifests/application/application/base/params.env", `
|
|
project=
|
|
`)
|
|
th.writeK("/manifests/application/application/base", `
|
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
kind: Kustomization
|
|
resources:
|
|
- cluster-role.yaml
|
|
- cluster-role-binding.yaml
|
|
- service-account.yaml
|
|
- service.yaml
|
|
- stateful-set.yaml
|
|
namespace: kubeflow
|
|
nameprefix: application-controller-
|
|
configMapGenerator:
|
|
- name: parameters
|
|
env: params.env
|
|
generatorOptions:
|
|
disableNameSuffixHash: true
|
|
images:
|
|
- name: gcr.io/kubeflow-images-public/kubernetes-sigs/application
|
|
newName: gcr.io/kubeflow-images-public/kubernetes-sigs/application
|
|
newTag: 1.0-beta
|
|
vars:
|
|
- name: project
|
|
objref:
|
|
kind: ConfigMap
|
|
name: parameters
|
|
apiVersion: v1
|
|
fieldref:
|
|
fieldpath: data.project
|
|
configurations:
|
|
- params.yaml
|
|
`)
|
|
}
|
|
|
|
func TestApplicationOverlaysApplication(t *testing.T) {
|
|
th := NewKustTestHarness(t, "/manifests/application/application/overlays/application")
|
|
writeApplicationOverlaysApplication(th)
|
|
m, err := th.makeKustTarget().MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
expected, err := m.AsYaml()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
targetPath := "../application/application/overlays/application"
|
|
fsys := fs.MakeRealFS()
|
|
lrc := loader.RestrictionRootOnly
|
|
_loader, loaderErr := loader.NewLoader(lrc, validators.MakeFakeValidator(), targetPath, fsys)
|
|
if loaderErr != nil {
|
|
t.Fatalf("could not load kustomize loader: %v", loaderErr)
|
|
}
|
|
rf := resmap.NewFactory(resource.NewFactory(kunstruct.NewKunstructuredFactoryImpl()), transformer.NewFactoryImpl())
|
|
pc := plugins.DefaultPluginConfig()
|
|
kt, err := target.NewKustTarget(_loader, rf, transformer.NewFactoryImpl(), plugins.NewLoader(pc, rf))
|
|
if err != nil {
|
|
th.t.Fatalf("Unexpected construction error %v", err)
|
|
}
|
|
actual, err := kt.MakeCustomizedResMap()
|
|
if err != nil {
|
|
t.Fatalf("Err: %v", err)
|
|
}
|
|
th.assertActualEqualsExpected(actual, string(expected))
|
|
}
|