/* Copyright The Helm Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package driver // import "k8s.io/helm/pkg/storage/driver" import ( "fmt" "testing" sqlmock "github.com/DATA-DOG/go-sqlmock" "github.com/jmoiron/sqlx" "k8s.io/api/core/v1" apierrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime/schema" corev1 "k8s.io/client-go/kubernetes/typed/core/v1" rspb "k8s.io/helm/pkg/proto/hapi/release" ) func releaseStub(name string, vers int32, namespace string, code rspb.Status_Code) *rspb.Release { return &rspb.Release{ Name: name, Version: vers, Namespace: namespace, Info: &rspb.Info{Status: &rspb.Status{Code: code}}, } } func shallowReleaseEqual(r1 *rspb.Release, r2 *rspb.Release) bool { if r1.Name != r2.Name || r1.Namespace != r2.Namespace || r1.Version != r2.Version || r1.Manifest != r2.Manifest { return false } return true } func testKey(name string, vers int32) string { return fmt.Sprintf("%s.v%d", name, vers) } func tsFixtureMemory(t *testing.T) *Memory { hs := []*rspb.Release{ // rls-a releaseStub("rls-a", 4, "default", rspb.Status_DEPLOYED), releaseStub("rls-a", 1, "default", rspb.Status_SUPERSEDED), releaseStub("rls-a", 3, "default", rspb.Status_SUPERSEDED), releaseStub("rls-a", 2, "default", rspb.Status_SUPERSEDED), // rls-b releaseStub("rls-b", 4, "default", rspb.Status_DEPLOYED), releaseStub("rls-b", 1, "default", rspb.Status_SUPERSEDED), releaseStub("rls-b", 3, "default", rspb.Status_SUPERSEDED), releaseStub("rls-b", 2, "default", rspb.Status_SUPERSEDED), } mem := NewMemory() for _, tt := range hs { err := mem.Create(testKey(tt.Name, tt.Version), tt) if err != nil { t.Fatalf("Test setup failed to create: %s\n", err) } } return mem } // newTestFixture initializes a MockConfigMapsInterface. // ConfigMaps are created for each release provided. func newTestFixtureCfgMaps(t *testing.T, releases ...*rspb.Release) *ConfigMaps { var mock MockConfigMapsInterface mock.Init(t, releases...) return NewConfigMaps(&mock) } // MockConfigMapsInterface mocks a kubernetes ConfigMapsInterface type MockConfigMapsInterface struct { corev1.ConfigMapInterface objects map[string]*v1.ConfigMap } // Init initializes the MockConfigMapsInterface with the set of releases. func (mock *MockConfigMapsInterface) Init(t *testing.T, releases ...*rspb.Release) { mock.objects = map[string]*v1.ConfigMap{} for _, rls := range releases { objkey := testKey(rls.Name, rls.Version) cfgmap, err := newConfigMapsObject(objkey, rls, nil) if err != nil { t.Fatalf("Failed to create configmap: %s", err) } mock.objects[objkey] = cfgmap } } // Get returns the ConfigMap by name. func (mock *MockConfigMapsInterface) Get(name string, options metav1.GetOptions) (*v1.ConfigMap, error) { object, ok := mock.objects[name] if !ok { return nil, apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name) } return object, nil } // List returns the a of ConfigMaps. func (mock *MockConfigMapsInterface) List(opts metav1.ListOptions) (*v1.ConfigMapList, error) { var list v1.ConfigMapList for _, cfgmap := range mock.objects { list.Items = append(list.Items, *cfgmap) } return &list, nil } // Create creates a new ConfigMap. func (mock *MockConfigMapsInterface) Create(cfgmap *v1.ConfigMap) (*v1.ConfigMap, error) { name := cfgmap.ObjectMeta.Name if object, ok := mock.objects[name]; ok { return object, apierrors.NewAlreadyExists(schema.GroupResource{Resource: "tests"}, name) } mock.objects[name] = cfgmap return cfgmap, nil } // Update updates a ConfigMap. func (mock *MockConfigMapsInterface) Update(cfgmap *v1.ConfigMap) (*v1.ConfigMap, error) { name := cfgmap.ObjectMeta.Name if _, ok := mock.objects[name]; !ok { return nil, apierrors.NewNotFound(v1.Resource("tests"), name) } mock.objects[name] = cfgmap return cfgmap, nil } // Delete deletes a ConfigMap by name. func (mock *MockConfigMapsInterface) Delete(name string, opts *metav1.DeleteOptions) error { if _, ok := mock.objects[name]; !ok { return apierrors.NewNotFound(v1.Resource("tests"), name) } delete(mock.objects, name) return nil } // newTestFixture initializes a MockSecretsInterface. // Secrets are created for each release provided. func newTestFixtureSecrets(t *testing.T, releases ...*rspb.Release) *Secrets { var mock MockSecretsInterface mock.Init(t, releases...) return NewSecrets(&mock) } // MockSecretsInterface mocks a kubernetes SecretsInterface type MockSecretsInterface struct { corev1.SecretInterface objects map[string]*v1.Secret } // Init initializes the MockSecretsInterface with the set of releases. func (mock *MockSecretsInterface) Init(t *testing.T, releases ...*rspb.Release) { mock.objects = map[string]*v1.Secret{} for _, rls := range releases { objkey := testKey(rls.Name, rls.Version) secret, err := newSecretsObject(objkey, rls, nil) if err != nil { t.Fatalf("Failed to create secret: %s", err) } mock.objects[objkey] = secret } } // Get returns the Secret by name. func (mock *MockSecretsInterface) Get(name string, options metav1.GetOptions) (*v1.Secret, error) { object, ok := mock.objects[name] if !ok { return nil, apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name) } return object, nil } // List returns the a of Secret. func (mock *MockSecretsInterface) List(opts metav1.ListOptions) (*v1.SecretList, error) { var list v1.SecretList for _, secret := range mock.objects { list.Items = append(list.Items, *secret) } return &list, nil } // Create creates a new Secret. func (mock *MockSecretsInterface) Create(secret *v1.Secret) (*v1.Secret, error) { name := secret.ObjectMeta.Name if object, ok := mock.objects[name]; ok { return object, apierrors.NewAlreadyExists(schema.GroupResource{Resource: "tests"}, name) } mock.objects[name] = secret return secret, nil } // Update updates a Secret. func (mock *MockSecretsInterface) Update(secret *v1.Secret) (*v1.Secret, error) { name := secret.ObjectMeta.Name if _, ok := mock.objects[name]; !ok { return nil, apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name) } mock.objects[name] = secret return secret, nil } // Delete deletes a Secret by name. func (mock *MockSecretsInterface) Delete(name string, opts *metav1.DeleteOptions) error { if _, ok := mock.objects[name]; !ok { return apierrors.NewNotFound(schema.GroupResource{Resource: "tests"}, name) } delete(mock.objects, name) return nil } // newTestFixtureSQL mocks the SQL database (for testing purposes) func newTestFixtureSQL(t *testing.T, releases ...*rspb.Release) (*SQL, sqlmock.Sqlmock) { sqlDB, mock, err := sqlmock.New() if err != nil { t.Fatalf("error when opening stub database connection: %v", err) } sqlxDB := sqlx.NewDb(sqlDB, "sqlmock") return &SQL{ db: sqlxDB, Log: func(_ string, _ ...interface{}) {}, }, mock }